In this chapter, you have learned about Burp Suite and its various editions. You have worked through setting up your environment and learned how to prepare your lab by leveraging vulnerable web applications that are freely available on the internet. You have gained a good understanding of the various tools that exist within Burp Suite, and how to use them by making use of practical examples in your own lab environment.
In the next chapter, Chapter 8, Attacking Web Applications, we will look at the various vulnerabilities that exist within web applications and understand how and why they exist. We will use various tools, including Burp Suite, to perform various attacks on vulnerable web applications.