Don’t use young stability and indulgence, in exchange for a lifetime of humble and mediocre, your efforts and pay now, hide your appearance after ten years…
—- netease Cloud review
After last
BurpSuite2021 — Intruder module
Other Settings
1. Save the attack data and view it directly from the dashboard next time
2. Modify data. The length of the packet is automatically updated
3. After the request fails, try to connect three times, with an interval of 2 seconds
4. Save the request and response information, and generate the unmodified basic request
5. Add keywords to the response page, which will be checked if found
6. Obtain key parameters of the response page, such as token, through regex, and then act as a dictionary to participate in blasting
7. Search for payload in the response message
8. Redirect Settings
Never: does not follow the redirection
On-site only: redirects to the same web site
In-scope only: follows the redirection within the scope
Always: Always follow redirects, possibly to other sites
Vi. Tool download address
1. Public account reply: 20210531
2. Video Private message: 20210531
Illegal prohibition, at your own risk
Welcome to the public number: Web security tool library
Welcome to pay attention to the video number: it is also
This article uses the article synchronization assistant to synchronize