This is the core functionality of the application. This feature of Burp allows the user to automate the process that a user wants. The automation is used to perform attacks against web applications. This feature is highly customizable and can be used for various tasks, ranging from brute-force, right up to exploiting SQL injections and OS command injection, and so on.
The Intruder has four subtabs, which are:
- Target
- Positions
- Payloads
- Options
The Target tab shows the IP and port that the request is being sent to, along with the Start attack button. This button is clicked once and the setup for the particular request to be tested ...