- The Burp Suite proxy is the centerpiece. This enables Burp Suite to function as an interception proxy, allowing all the tools within Burp Suite to operate.
- This scan analyzes the vulnerabilities of existing requests and responses. It does not submit any requests to the web application, therefore eliminating the amount of noise that can be detected.
- This is used to manually manipulate the reissuing of HTTP requests. You can leverage a repeater to check what the output would be if an HTTP request is modified, for example, by using a SQL injection attack.
- A cluster bomb provides the most comprehensive results, but it is also the most time-consuming, depending on the word lists that are used.
- By using the BApp Store or third-party extensions that can be loaded into Burp Suite.





















































