Results
111 results for ‘Thrifty medicines https://simplemedrx.top’
Can't find what you're looking for? Try out a different search term, or contact our Technical Support team
Filter results
PROFESSIONAL COMMUNITY
Mapping the visible attack surface with Burp Suite
To discover locations that are available to audit, you need to map the target application's visible attack surface. This refers to the endpoints that are ...
PROFESSIONAL COMMUNITY
Testing for prototype pollution with DOM Invader
Prototype pollution is a JavaScript vulnerability. It enables an attacker to add arbitrary properties to global object prototypes, which may then be ...
PROFESSIONAL COMMUNITY
Which Burp Suite Mac installer do you need to download?
In 2020, Apple began introducing a new type of processor for its Mac devices. You need to use a different version of the Burp Suite installer depending on ...
PROFESSIONAL COMMUNITY
Evaluating inputs with Burp Suite
Once you have discovered functionality that is worth investigating further, you can use a range of Burp's tools to evaluate the user controllable inputs. ...
PROFESSIONAL COMMUNITY
Troubleshooting for mobile devices
In this section, we'll provide some simple steps you can take to resolve common issues when trying to test mobile apps using Burp Suite. I can't access ...
PROFESSIONAL COMMUNITY
Spoofing your IP address using Burp Proxy match and replace
Learn how to spoof your IP address using match and replace rules when performing manual testing in Burp Suite Professional / Burp Suite Community Edition.
PROFESSIONAL COMMUNITY
You can use Burp Suite to perform security tests for mobile applications. To do this, you need to configure the mobile device to proxy its traffic via Burp ...
PROFESSIONAL COMMUNITY
Testing for privilege escalation
When a user logs in to an application, they usually only have access to the parts of the application that they need to perform their specific tasks. If ...
PROFESSIONAL COMMUNITY
Testing for directory traversal vulnerabilities with Burp Suite
Directory traversal vulnerabilities (also known as file path vulnerabilities) allow an attacker to read arbitrary files on the server that is running an ...
PROFESSIONAL COMMUNITY
Discovering supported hostnames with Burp Suite
You can use Burp Intruder to discover additional, hidden hosts that are in scope but aren't explicitly linked from the initial set of domains you're ...