O'Reilly logo

Kali Linux Intrusion and Exploitation Cookbook by Ishan Girdhar, Dhruv Shah

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Using Burp Intruder for customized attack automation

In this recipe, we will learn how we can use Burp Intruder to perform application login bruteforce and directory bruteforce. The intruder can be used in any scenario where bruteforcing needs to done and can be customized as per your requirement.

Getting ready

To step through this recipe, you will need Kali Linux running on Oracle Virtualbox and an Internet connection. No other prerequisites are required.

How to do it...

For this recipe, you need to perform the following steps:

  1. Open the Damn Vulnerable Web Application page in the browser and traverse to the Brute Force section, as shown in the following screenshot:

  2. Intercept the request using Burp, as shown in the following screenshot:

  3. As shown ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required