

Managing application logins using the configuration library.Spoofing your IP address using Burp Proxy match and replace.Testing for reflected XSS using Burp Repeater.

Viewing requests sent by Burp extensions using Logger.Resending individual requests with Burp Repeater.Augmenting manual testing using Burp Scanner.Intercepting HTTP requests and responses.Viewing requests sent by Burp extensions.Testing for directory traversal vulnerabilities.Testing for blind XXE injection vulnerabilities.Testing for XXE injection vulnerabilities.Testing for asynchronous OS command injection vulnerabilities.Testing for OS command injection vulnerabilities.Bypassing XSS filters by enumerating permitted tags and attributes.

