Burp - Repeater

            

Scenario: Intercept web site and modify headers

Solution:

Use Burp suite to Intercept traffic and submit the request multiple times with modified values

Burp Suite is an integrated platform for performing security testing of web applications.
  1. Burp tool -> Proxy -> Open Browser.
  2. Navigate to the site.
  3. Burp tool -> Intercept On.
  4. Navigate to the page which you want to intercept.
  5. The request would be intercepted.
  6. Navigate to Http History tab -> Right click on the request you want to repeat -> Send to Repeater.
  7. On Repeater tab you will see Request & Response (which initially would be blank).
  8. You can now change the Request, like change Http Method from POST -> GET etc -> then click Send button.
  9. The response based on modified request would be rendered.

No comments:

Post a Comment

Move Github Sub Repository back to main repo

 -- delete .gitmodules git rm --cached MyProject/Core git commit -m 'Remove myproject_core submodule' rm -rf MyProject/Core git remo...