Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Recent questions tagged burp-repeater
Home
Tag
burp-repeater
0
votes
Under which subtab of the Proxy tab are proxy details configured to be the same as the browser proxy, so that both request and response can be captured?
asked
Apr 16, 2022
in
Burp Suite
by
SakshiSharma
proxy-tab
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
0
votes
HTTP is a stateless protocol. How does HTTP achieve this?
asked
Apr 16, 2022
in
Burp Suite
by
SakshiSharma
stateless-protocol
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
0
votes
The Request body can be changed in the “HTTP History Tab”.
asked
Apr 16, 2022
in
Burp Suite
by
SakshiSharma
history-tab
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+1
vote
Which of the following component of Burp Suite enables to test the randomness of session tokens?
asked
Apr 16, 2022
in
Burp Suite
by
SakshiSharma
session-tokens
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+1
vote
HTTP uses which of the following handshake mechanism?
asked
Apr 16, 2022
in
Burp Suite
by
SakshiSharma
handshake-mechanism
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+2
votes
Where can responses be viewed in Burp Suite?
asked
May 14, 2021
in
Cyber Security
by
rajeshsharma
burp-suite
burp
cyber-security
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+1
vote
The \’\’HTTP History Tab\’\’ captures all host URLs.
asked
May 14, 2021
in
Cyber Security
by
rajeshsharma
history
burp
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+1
vote
Which of the following can execute all the possible combination of attacks?
asked
May 14, 2021
in
Cyber Security
by
rajeshsharma
attacks
cyber-attacks
cyber-security
burp
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+1
vote
The session and token ID can be changed by using Sequencer.
asked
May 14, 2021
in
Burp Suite
by
rajeshsharma
token-id
session-id
burp
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+1
vote
You can check the response in Intercept tab.
asked
May 14, 2021
in
Cyber Security
by
rajeshsharma
intercept-tab
cyber-security
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+2
votes
What is the task of the Comment control when intercepting a Burp Suite request?
asked
May 14, 2021
in
Cyber Security
by
rajeshsharma
comment-contol
cyber-security
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+2
votes
What is the role of a Sequencer in request manipulation in Burp Suite?
asked
May 14, 2021
in
Burp Suite
by
rajeshsharma
burp-suite
cyber-security
request-manipulation
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+2
votes
Which of the following option is applicable for “Action” control for the panel in intercepting request?
asked
May 14, 2021
in
Burp Suite
by
rajeshsharma
proxy
cyber-security
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
0
votes
Which of the following option enables to identify flaws automatically?
asked
May 14, 2021
in
Burp Suite
by
rajeshsharma
flaws-identification
cyber-security
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+2
votes
Which of the following is used for manual footprinting?
asked
May 14, 2021
in
Burp Suite
by
rajeshsharma
burp
manual-footprinting
cyber-security
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+2
votes
Which of the following application is about extending Burp proxy?
asked
May 14, 2021
in
Burp Suite
by
rajeshsharma
burp-proxy
cybe-security
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+1
vote
What happens when Intercept is off?
asked
May 14, 2021
in
Cyber Security
by
rajeshsharma
burp-repeater
cyber-security
+1
vote
Which of the following option is true about XSS with Burp-Repeater tool?
asked
May 14, 2021
in
Cyber Security
by
rajeshsharma
cyber-security
burp-repeater
Page:
« prev
1
2
...