© Sagar Rahalkar 2021
S. RahalkarA Complete Guide to Burp Suite https://doi.org/10.1007/978-1-4842-6402-7_5

5. Intruder

Sagar Rahalkar1 
(1)
Pune, Maharashtra, India
 

In the last chapter, we saw some basics about the Burp Suite dashboard, target, and engagement tools. Now that we have seen the basics of intercepting requests and interpreting the summary on the dashboard, we will move ahead with using the Intruder tool. Intruder has advanced fuzzing capabilities that can be used in various attack scenarios.

Introduction to Intruder

Before we get into the details of various options within Intruder, it’s important to understand what Intruder is and how it can be helpful in web application security testing. Intruder is part of Burp Suite, which can be used ...

Get A Complete Guide to Burp Suite: Learn to Detect Application Vulnerabilities now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.