ProfessionalCommunity Edition

Analyzing the attack surface with Burp Suite

  • Last updated: March 1, 2024

  • Read time: 1 Minute

While you map the application, you should analyze your findings to identify key attack surface. You can use this information to plan your approach for auditing the application.

Was this article helpful?