|This article does not cite any references or sources. (May 2012)|
||The topic of this article may not meet Wikipedia's general notability guideline. (January 2014)|
When Burp suite is used as a proxy server and a web browser uses this proxy server, it is possible to have control of all traffic that is exchanged between the web browser and web servers. Burp makes it possible to manipulate data before it is sent to the web server. For this, tables are used, which is a user friendly way of manipulating the data. With this functionality, exceptional situations can be reproduced and bugs and vulnerabilities of the website that is hosted on the web server can be pinpointed.
The Burp suite spider is a tool that can enumerate and map out the various web applications of a web page. For this, the spider examines cookies and initiates connections with these web applications.
The intruder is a tool that can perform automated attacks on web applications. For this, the user of Burp suite must already have detailed knowledge of the application that is attacked and of the HTTP protocol. The tool offers an algorithm that is configurable and that can generate malicious HTTP requests. With this tool, vulnerabilities such as SQL injections, cross-site scripting, parameter manipulation and vulnerability for brute force attacks can be tested and detected.
The repeater is a simple tool that can be used to modify requests to the server and resend them, observing the results. This is used for manually testing an application.