Login
Remember
Register
Ask a Question
Recent questions tagged burp-proxy
0
votes
1
answer
ssl handshake is used in http.
asked
Apr 16, 2022
in
Burp Suite
by
sharadyadav1986
ssl-handshake
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
0
votes
1
answer
What is the role of the do intercept command for http messages?
asked
Apr 16, 2022
in
Burp Suite
by
sharadyadav1986
intercept-role
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
0
votes
1
answer
If there are eight payloads with two parameters each how many requests will a battering ram make?
asked
Apr 16, 2022
in
Burp Suite
by
sharadyadav1986
burp-payloads
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+1
vote
1
answer
Which of the following burp suite tool is used for web application mapping?
asked
Apr 16, 2022
in
Burp Suite
by
sharadyadav1986
burp-suite-tool
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+1
vote
1
answer
Which of the following component of burp suite is used to inspect and modify traffic between a browser and the target applications?
asked
Apr 16, 2022
in
Burp Suite
by
sharadyadav1986
burp-suite-command
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
0
votes
1
answer
The āsā in https stands for:
asked
Apr 16, 2022
in
Burp Suite
by
sharadyadav1986
https
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
0
votes
1
answer
When intercept is on you can?
asked
Apr 16, 2022
in
Burp Suite
by
sharadyadav1986
intercept
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
0
votes
1
answer
comparer can be used to compare both words and bytes.
asked
Apr 16, 2022
in
Burp Suite
by
sharadyadav1986
compare-request
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+1
vote
1
answer
What are the steps to be taken when Burp does not intercept HTTPS requests?
asked
Apr 16, 2022
in
Burp Suite
by
sharadyadav1986
intercept-http-request
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
0
votes
1
answer
When Intercept is on, the request will hit the _______.
asked
Apr 16, 2022
in
Burp Suite
by
sharadyadav1986
request-intercept
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
0
votes
1
answer
A site map helps to capture a specified URL.
asked
Apr 16, 2022
in
Burp Suite
by
sharadyadav1986
site-map
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+1
vote
1
answer
Which of the following attacks with a single payload?
asked
Apr 16, 2022
in
Burp Suite
by
sharadyadav1986
single-payload
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+1
vote
1
answer
Which of the following statement is true about a cluster bomb attack?
asked
Apr 16, 2022
in
Burp Suite
by
sharadyadav1986
cluster-attacks
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+1
vote
1
answer
What is the task of the Forward control when intercepting a Burp Suite request?
asked
Apr 16, 2022
in
Burp Suite
by
sharadyadav1986
forward-control
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
0
votes
1
answer
Spidering is also known as ____________.
asked
Apr 16, 2022
in
Burp Suite
by
SakshiSharma
spidering
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+1
vote
1
answer
Which of the following intruder attack uses a single payload set by enumerating all the parameters in a single request using the same payload?
asked
Apr 16, 2022
in
Burp Suite
by
SakshiSharma
intruder-attack
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+1
vote
1
answer
Which of the following intruder attack uses single payload sets?
asked
Apr 16, 2022
in
Burp Suite
by
SakshiSharma
intruder-attack
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
0
votes
1
answer
Intercept can be used to change a request body.
asked
Apr 16, 2022
in
Burp Suite
by
SakshiSharma
intercept
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
0
votes
1
answer
If there are five payloads with three parameters each, how many requests will a sniper make?
asked
Apr 16, 2022
in
Burp Suite
by
SakshiSharma
payloads
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+1
vote
1
answer
Which of the following is used to automatically identify flaws?
asked
Apr 16, 2022
in
Burp Suite
by
SakshiSharma
identify-flaws
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
Page:
1
2
next »
...