Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Ask a Question
Top 100+ questions in Burp Suite
Home
Questions
Burp Suite
0
votes
Q: ssl handshake is used in http.
asked
Apr 16, 2022
in
Burp Suite
by
sharadyadav1986
ssl-handshake
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
0
votes
Q: What is the role of the do intercept command for http messages?
asked
Apr 16, 2022
in
Burp Suite
by
sharadyadav1986
intercept-role
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
0
votes
Q: If there are eight payloads with two parameters each how many requests will a battering ram make?
asked
Apr 16, 2022
in
Burp Suite
by
sharadyadav1986
burp-payloads
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+1
vote
Q: Which of the following burp suite tool is used for web application mapping?
asked
Apr 16, 2022
in
Burp Suite
by
sharadyadav1986
burp-suite-tool
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+1
vote
Q: Which of the following component of burp suite is used to inspect and modify traffic between a browser and the target applications?
asked
Apr 16, 2022
in
Burp Suite
by
sharadyadav1986
burp-suite-command
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
0
votes
Q: The “s” in https stands for:
asked
Apr 16, 2022
in
Burp Suite
by
sharadyadav1986
https
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
0
votes
Q: When intercept is on you can?
asked
Apr 16, 2022
in
Burp Suite
by
sharadyadav1986
intercept
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
0
votes
Q: comparer can be used to compare both words and bytes.
asked
Apr 16, 2022
in
Burp Suite
by
sharadyadav1986
compare-request
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+1
vote
Q: What are the steps to be taken when Burp does not intercept HTTPS requests?
asked
Apr 16, 2022
in
Burp Suite
by
sharadyadav1986
intercept-http-request
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
0
votes
Q: When Intercept is on, the request will hit the _______.
asked
Apr 16, 2022
in
Burp Suite
by
sharadyadav1986
request-intercept
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
0
votes
Q: A site map helps to capture a specified URL.
asked
Apr 16, 2022
in
Burp Suite
by
sharadyadav1986
site-map
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+1
vote
Q: Which of the following attacks with a single payload?
asked
Apr 16, 2022
in
Burp Suite
by
sharadyadav1986
single-payload
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+1
vote
Q: Which of the following statement is true about a cluster bomb attack?
asked
Apr 16, 2022
in
Burp Suite
by
sharadyadav1986
cluster-attacks
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+1
vote
Q: What is the task of the Forward control when intercepting a Burp Suite request?
asked
Apr 16, 2022
in
Burp Suite
by
sharadyadav1986
forward-control
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
0
votes
Q: Spidering is also known as ____________.
asked
Apr 16, 2022
in
Burp Suite
by
SakshiSharma
spidering
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+1
vote
Q: Which of the following intruder attack uses a single payload set by enumerating all the parameters in a single request using the same payload?
asked
Apr 16, 2022
in
Burp Suite
by
SakshiSharma
intruder-attack
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+1
vote
Q: Which of the following intruder attack uses single payload sets?
asked
Apr 16, 2022
in
Burp Suite
by
SakshiSharma
intruder-attack
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
0
votes
Q: Intercept can be used to change a request body.
asked
Apr 16, 2022
in
Burp Suite
by
SakshiSharma
intercept
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
0
votes
Q: If there are five payloads with three parameters each, how many requests will a sniper make?
asked
Apr 16, 2022
in
Burp Suite
by
SakshiSharma
payloads
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+1
vote
Q: Which of the following is used to automatically identify flaws?
asked
Apr 16, 2022
in
Burp Suite
by
SakshiSharma
identify-flaws
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
0
votes
Q: Under which subtab of the Proxy tab are proxy details configured to be the same as the browser proxy, so that both request and response can be captured?
asked
Apr 16, 2022
in
Burp Suite
by
SakshiSharma
proxy-tab
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
0
votes
Q: HTTP is a stateless protocol. How does HTTP achieve this?
asked
Apr 16, 2022
in
Burp Suite
by
SakshiSharma
stateless-protocol
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
0
votes
Q: The Request body can be changed in the “HTTP History Tab”.
asked
Apr 16, 2022
in
Burp Suite
by
SakshiSharma
history-tab
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+1
vote
Q: Which of the following component of Burp Suite enables to test the randomness of session tokens?
asked
Apr 16, 2022
in
Burp Suite
by
SakshiSharma
session-tokens
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+1
vote
Q: HTTP uses which of the following handshake mechanism?
asked
Apr 16, 2022
in
Burp Suite
by
SakshiSharma
handshake-mechanism
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+1
vote
Q: The session and token ID can be changed by using Sequencer.
asked
May 14, 2021
in
Burp Suite
by
rajeshsharma
token-id
session-id
burp
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+2
votes
Q: What is the role of a Sequencer in request manipulation in Burp Suite?
asked
May 14, 2021
in
Burp Suite
by
rajeshsharma
burp-suite
cyber-security
request-manipulation
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+2
votes
Q: Which of the following option is applicable for “Action” control for the panel in intercepting request?
asked
May 14, 2021
in
Burp Suite
by
rajeshsharma
proxy
cyber-security
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
0
votes
Q: Which of the following option enables to identify flaws automatically?
asked
May 14, 2021
in
Burp Suite
by
rajeshsharma
flaws-identification
cyber-security
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+2
votes
Q: Which of the following is used for manual footprinting?
asked
May 14, 2021
in
Burp Suite
by
rajeshsharma
burp
manual-footprinting
cyber-security
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
Page:
1
2
next »
...