Bug Hunting #2 - Intercept/Capture Requests and Modify Responses using Burp Suite

Поділитися
Вставка
  • Опубліковано 19 вер 2024
  • Learn how to use Burp Suite to intercept and modify http / https requests. This is part 2 video on burp suite, if you want to learn how to become bug bounty hunter and penetration tester then subscribe this channel for awesome cyber security and bug bounty tutorials.
    Watch Part 1: • Bug Hunting #1 - Setti...
    Download bug bounty tools from here: www.thetechrix...
    In the Burp Suite The Intercept tab displays individual HTTP requests and responses that have been intercepted by Burp Proxy for review and modification. This feature is a key part of Burp's user-driven workflow
    • Manually reviewing intercepted messages is often key to understanding the application's attack surface in detail.
    • Modifying request parameters often allows you to quickly identify common security vulnerabilities.
    Intercepted requests and responses are displayed in an HTTP message editor, which contains numerous features designed to help you quickly analyze and manipulate the messages.
    Creator: Swetabh Suman (Ask questions: @gitcodeswetabh on Instagram)
    Music:
    bensound.com
    #WithMe #BugBounty

КОМЕНТАРІ • 28

  • @cyber.security.training
    @cyber.security.training  4 роки тому +2

    📧READ MORE📩
    Download latest bug bounty tools from here:
    www.thetechrix.com/2020/07/top-15-tools-software-for-penetration.html
    Ask questions: instagram.com/gitcodeswetabh/

  • @CarrierWallah
    @CarrierWallah 4 роки тому +1

    Nyc one

  • @TheAppetizer6
    @TheAppetizer6 4 роки тому +1

    Good information ..lge rho😊😉

  • @novianindy887
    @novianindy887 Рік тому +1

    how to make it automatic changing string/text on the fly?

  • @sanketsuryawanshi
    @sanketsuryawanshi 4 роки тому +1

    👍 want more seires on Burpsuit plz

  • @anilkumarsingh7977
    @anilkumarsingh7977 4 роки тому

    Good job

  • @euvsielr
    @euvsielr 4 роки тому +1

    Thank u for uploading practical videos u are amazing bro

  • @capt.warrior
    @capt.warrior 2 роки тому

    How to unprotect number from bomberz using burp suit

  • @rishabhpratapsingh2519
    @rishabhpratapsingh2519 2 роки тому

    But I site mai RPA Token Generate ho raha, Kuch guide kar sakte ho kya ha?

  • @nilotpaldevsarma5732
    @nilotpaldevsarma5732 4 роки тому

    can we bypass function call like onclick=verify() this kind of call using brup. Please mail me the details

  • @syedimranpasha5156
    @syedimranpasha5156 2 роки тому

    Sir burp suite works in windows 7

  • @mohitprajapati394
    @mohitprajapati394 2 роки тому

    how to solve this bug, pls tell me.

  • @shraddhasuman9240
    @shraddhasuman9240 4 роки тому +1

    Thanks!🙏

  • @nogoodhacker6944
    @nogoodhacker6944 3 роки тому

    YOu didn't modify response, instead you modified the request!
    Please don't click bait...

  • @sidsakhare9495
    @sidsakhare9495 4 роки тому

    Sir hackers kis country ka hai ye kaise pata chalta hai

    • @cyber.security.training
      @cyber.security.training  4 роки тому

      Agar wo hacker hoga to location easily pta nhi chalegi 😅 because he must be using a lot VPN servers to change his IP address

    • @sidsakhare9495
      @sidsakhare9495 4 роки тому

      @@cyber.security.training to phir government kaise pata karti hai ko wo hacker Chinese hai

  • @sanketsuryawanshi
    @sanketsuryawanshi 4 роки тому

    Thanks brother ✌🔥👌i have question that can we intercept with otp from server because i saw one video

    • @cyber.security.training
      @cyber.security.training  4 роки тому

      Yes, It's possible and there are many ways to do it but you have to look for a valid loophole that can help you to exploit this vulnerability. There are few security researchers who successfully found and reported this bug to the company. One of the security researcher is Jobert Abma who wrote a very detailed report - you can read the proof of concept and try to understand this vulnerability. Here is the URL of that POC report: hackerone.com/reports/128085

    • @sanketsuryawanshi
      @sanketsuryawanshi 4 роки тому

      @@cyber.security.training thanks brother 🤩✌🔥

  • @3KLuu
    @3KLuu 3 місяці тому

    english?????

  • @shalinisuman7133
    @shalinisuman7133 4 роки тому +1

    🙏