Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Recent questions tagged burp-suite-websocket
Home
Tag
burp-suite-websocket
0
votes
ssl handshake is used in http.
asked
Apr 16, 2022
in
Burp Suite
by
sharadyadav1986
ssl-handshake
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
0
votes
What is the role of the do intercept command for http messages?
asked
Apr 16, 2022
in
Burp Suite
by
sharadyadav1986
intercept-role
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
0
votes
If there are eight payloads with two parameters each how many requests will a battering ram make?
asked
Apr 16, 2022
in
Burp Suite
by
sharadyadav1986
burp-payloads
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+1
vote
Which of the following burp suite tool is used for web application mapping?
asked
Apr 16, 2022
in
Burp Suite
by
sharadyadav1986
burp-suite-tool
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+1
vote
Which of the following component of burp suite is used to inspect and modify traffic between a browser and the target applications?
asked
Apr 16, 2022
in
Burp Suite
by
sharadyadav1986
burp-suite-command
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
0
votes
The “s” in https stands for:
asked
Apr 16, 2022
in
Burp Suite
by
sharadyadav1986
https
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
0
votes
When intercept is on you can?
asked
Apr 16, 2022
in
Burp Suite
by
sharadyadav1986
intercept
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
0
votes
comparer can be used to compare both words and bytes.
asked
Apr 16, 2022
in
Burp Suite
by
sharadyadav1986
compare-request
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+1
vote
What are the steps to be taken when Burp does not intercept HTTPS requests?
asked
Apr 16, 2022
in
Burp Suite
by
sharadyadav1986
intercept-http-request
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
0
votes
When Intercept is on, the request will hit the _______.
asked
Apr 16, 2022
in
Burp Suite
by
sharadyadav1986
request-intercept
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
0
votes
A site map helps to capture a specified URL.
asked
Apr 16, 2022
in
Burp Suite
by
sharadyadav1986
site-map
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+1
vote
Which of the following attacks with a single payload?
asked
Apr 16, 2022
in
Burp Suite
by
sharadyadav1986
single-payload
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+1
vote
Which of the following statement is true about a cluster bomb attack?
asked
Apr 16, 2022
in
Burp Suite
by
sharadyadav1986
cluster-attacks
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+1
vote
What is the task of the Forward control when intercepting a Burp Suite request?
asked
Apr 16, 2022
in
Burp Suite
by
sharadyadav1986
forward-control
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
0
votes
Spidering is also known as ____________.
asked
Apr 16, 2022
in
Burp Suite
by
SakshiSharma
spidering
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+1
vote
Which of the following intruder attack uses a single payload set by enumerating all the parameters in a single request using the same payload?
asked
Apr 16, 2022
in
Burp Suite
by
SakshiSharma
intruder-attack
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+1
vote
Which of the following intruder attack uses single payload sets?
asked
Apr 16, 2022
in
Burp Suite
by
SakshiSharma
intruder-attack
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
0
votes
Intercept can be used to change a request body.
asked
Apr 16, 2022
in
Burp Suite
by
SakshiSharma
intercept
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
0
votes
If there are five payloads with three parameters each, how many requests will a sniper make?
asked
Apr 16, 2022
in
Burp Suite
by
SakshiSharma
payloads
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+1
vote
Which of the following is used to automatically identify flaws?
asked
Apr 16, 2022
in
Burp Suite
by
SakshiSharma
identify-flaws
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
Page:
1
2
next »
...