Burp Suite is an integrated platform for attacking web applications. It contains all of the Burp tools with numerous interfaces between them designed to facilitate and speed up the process of attacking an application. All tools share the same robust framework for handling HTTP requests, persistence, authentication, upstream proxies, logging, alerting and extensibility.
Burp Suite allows you to combine manual and automated techniques to enumerate, analyse, scan, attack and exploit web applications. The various Burp tools work together effectively to share information and allow findings identified within one tool to form the basis of an attack using another.
Key features unique to Burp Suite include: Detailed analysis and rendering of requests and responses. One-click transfer of interesting requests between tools. Site map showing information accumulated about target applications in tree and table form. Ability to 'passively' spider an application in a non-intrusive manner, with all requests originating from the user's browser. Suite-level target scope configuration, driving numerous individual tool actions. FIPS-compliant statistical analysis of session token randomness. Utilities for decoding and comparing application data. Support for custom client and server SSL certificates. Extensibility via the IBurpExtender interface. Centrally configured settings for upstream proxies, web and proxy authentication, and logging. Tools can run in a single tabbed window, or be detached in individual windows. Runs in both Linux and Windows.
Burp Suite is a Java application, and runs on any platform for which a Java Runtime Environment is available. It requires version 1.5 or later.
View the original article here
This post was made using the Auto Blogging Software from WebMagnates.org This line will not appear when posts are made after activating the software to full version.
Hiç yorum yok:
Yorum Gönder