Burp`s vulnerability scanner scans an application to detect known vulnerabilities. The Open Web Application Security Project (OWASP) attempts to document and provide security vulnerabilities and types of attacks. It appears that the Burp Suite Vulnerability Scanner can automate the detection of vulnerabilities described by OWASP`s Top 10 at www.owasp.org/index.php/Top_10_2013-Top_10. Look at the output and select an interesting table with user information. Today`s internet has been distorted and distorted to use authentication and meeting management, which is basically a break between. The most common authentication attack uses a proxy-based attack tool (z.B. Burp Suite Intruder) to force a legitimate user`s login information. There is not much camouflage to this type of attack, but it is very successful because users continue to select weak passwords. We will use Burp Intruder as our tool of choice with a list of the most frequently used weak passwords.

There are several aspects of authentication throughout the web application that need to be considered for these attacks, z.B.: Burp Suite Enterprise Edition is a enterprise server solution for the automated and planned continuous scanning solution, capable of running a high volume of simultaneous scans (only agent volumes must be authorized to cover the required instance). The main features of this new product are: server installation, access via a modern web interface and REST API. Automated Web Scanning Developed by portswigger, Burp acts as IDS. This means you can use it to falsify and format form entries to the server as you wish. This allows you to manipulate all the JavaScript form fields that may occur. It is precisely for this reason that Javascript`s entry validation is unnecessary from a security point of view. Typically, a server only needs form entries in the right broadcast format. Burp offers this. In addition, Burp follows up with a spider, a scanner and an intruder, a sequencer and a repeater.