Burp Suite is an excellent tool to detect vulnerabilities. As we've seen in the previous chapters, it has a large variety of tools and options, and of course, extensions to help us to be more accurate and efficient while looking for bugs in an application. However, Burp Suite also has options to help us to exploit vulnerabilities, generate a proof about the exploitation, and reproduce the exploitation all of the times this is needed.
In this chapter, we will check how to exploit different kinds of vulnerabilities using Burp Suite's options, and in some cases the tools and extensions. We will be looking at the following topics in the chapter:
- Data exfiltration via a blind Boolean-based SQL injection
- Executing operating system (OS) commands using an SQL injection
- Executing out-of-band command injection
- Stealing session...