
In Burp Repeater, the current protocol is displayed in the upper-right corner of the screen, next to the target host. This is standard for HTTP/1 messages, but also applies to the editor's representation of HTTP/2 messages. In the message editor, the request line and status line contain the protocol version. There are a number of places where this information is displayed: When testing for protocol-level vulnerabilities, it's important that you're aware of which protocol is being used for each request. Keeping track of which protocol you're using You can still send individual HTTP/2 requests by switching the protocol in the Inspector if necessary. This is useful if you're performing testing where it's necessary to always use HTTP/1. You can also tailor this behavior to suit your current needs by changing the default protocol for the project. This ensures that, even if you're not conducting any protocol-specific testing, you can still take advantage of the performance improvements provided by HTTP/2 where available. To help you get the most out of these features, we've provided a brief overview of the background concepts that are relevant.īy default, Burp speaks HTTP/2 to all servers that advertise support for it via ALPN during the TLS handshake. Under the hood, HTTP/2 is very different from HTTP/1. HTTP/2: The Sequel Is Always Worse Background concepts
#BURP SUITE INTRUDER MANUAL#
Complementing your manual testing with Burp Scanner.Testing for directory traversal vulnerabilities.Testing for blind XXE injection vulnerabilities.


Testing for asynchronous OS command injection vulnerabilities.Testing for OS command injection vulnerabilities.Bypassing XSS filters by enumerating permitted tags and attributes.Testing for web message DOM XSS with DOM Invader.Testing for SQL injection vulnerabilities.Testing for parameter-based access control.Identifying which parts of a token impact the response.
#BURP SUITE INTRUDER PROFESSIONAL#
Search Professional and Community Edition
