Burp`s vulnerability scanner scans an application to detect known vulnerabilities. The Open Web Application Security Project (OWASP) attempts to document and provide security vulnerabilities and types of attacks. It appears that the Burp Suite Vulnerability Scanner can automate the detection of vulnerabilities described by OWASP`s Top 10 at www.owasp.org/index.php/Top_10_2013-Top_10. Look at the output and select an interesting table with user information. Today`s internet has been distorted and distorted to use authentication and meeting management, which is basically a break between. The most common authentication attack uses a proxy-based attack tool (z.B. Burp Suite Intruder) to force a legitimate user`s login information. There is not much camouflage to this type of attack, but it is very successful because users continue to select weak passwords. We will use Burp Intruder as our tool of choice with a list of the most frequently used weak passwords.