Login
Remember
Register
Ask a Question
Recent questions tagged cyber-security
+2
votes
1
answer
What is the role of a Sequencer in request manipulation in Burp Suite?
asked
May 14, 2021
in
Burp Suite
by
rajeshsharma
burp-suite
cyber-security
request-manipulation
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+2
votes
1
answer
Which of the following option is applicable for “Action” control for the panel in intercepting request?
asked
May 14, 2021
in
Burp Suite
by
rajeshsharma
proxy
cyber-security
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
0
votes
1
answer
Which of the following option enables to identify flaws automatically?
asked
May 14, 2021
in
Burp Suite
by
rajeshsharma
flaws-identification
cyber-security
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+1
vote
0
answers
What are the tasks related to Burp Proxy for intercepting and manipulating the request?
asked
May 14, 2021
in
Cyber Security
by
rajeshsharma
burp-proxy
cyber-security
+2
votes
1
answer
Which of the following is used for manual footprinting?
asked
May 14, 2021
in
Burp Suite
by
rajeshsharma
burp
manual-footprinting
cyber-security
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+1
vote
0
answers
What happens when Intercept is off?
asked
May 14, 2021
in
Cyber Security
by
rajeshsharma
burp-repeater
cyber-security
+1
vote
0
answers
Which of the following option is true about XSS with Burp-Repeater tool?
asked
May 14, 2021
in
Cyber Security
by
rajeshsharma
cyber-security
burp-repeater
0
votes
1
answer
Which of the following security property does Spoofing violate?
asked
Feb 24, 2021
in
Cyber Security
by
GeorgeBell
cyber-security
Page:
« prev
1
2
...