Bug Hunting #2 - Intercept/Capture Requests and Modify Responses using Burp Suite
Вставка
- Опубліковано 19 вер 2024
- Learn how to use Burp Suite to intercept and modify http / https requests. This is part 2 video on burp suite, if you want to learn how to become bug bounty hunter and penetration tester then subscribe this channel for awesome cyber security and bug bounty tutorials.
Watch Part 1: • Bug Hunting #1 - Setti...
Download bug bounty tools from here: www.thetechrix...
In the Burp Suite The Intercept tab displays individual HTTP requests and responses that have been intercepted by Burp Proxy for review and modification. This feature is a key part of Burp's user-driven workflow
• Manually reviewing intercepted messages is often key to understanding the application's attack surface in detail.
• Modifying request parameters often allows you to quickly identify common security vulnerabilities.
Intercepted requests and responses are displayed in an HTTP message editor, which contains numerous features designed to help you quickly analyze and manipulate the messages.
Creator: Swetabh Suman (Ask questions: @gitcodeswetabh on Instagram)
Music:
bensound.com
#WithMe #BugBounty
📧READ MORE📩
Download latest bug bounty tools from here:
www.thetechrix.com/2020/07/top-15-tools-software-for-penetration.html
Ask questions: instagram.com/gitcodeswetabh/
Nyc one
Thank you! Cheers!
Good information ..lge rho😊😉
Yes captain 🙌 😁
how to make it automatic changing string/text on the fly?
👍 want more seires on Burpsuit plz
Will publish next part in 2 days. Stay safe and stay tuned 😍
@@cyber.security.training thanks brother 😍🤩🔥✌
Good job
Thanks
Thank u for uploading practical videos u are amazing bro
Glad you like them!
How to unprotect number from bomberz using burp suit
But I site mai RPA Token Generate ho raha, Kuch guide kar sakte ho kya ha?
can we bypass function call like onclick=verify() this kind of call using brup. Please mail me the details
Sir burp suite works in windows 7
how to solve this bug, pls tell me.
Thanks!🙏
YOu didn't modify response, instead you modified the request!
Please don't click bait...
Sir hackers kis country ka hai ye kaise pata chalta hai
Agar wo hacker hoga to location easily pta nhi chalegi 😅 because he must be using a lot VPN servers to change his IP address
@@cyber.security.training to phir government kaise pata karti hai ko wo hacker Chinese hai
Thanks brother ✌🔥👌i have question that can we intercept with otp from server because i saw one video
Yes, It's possible and there are many ways to do it but you have to look for a valid loophole that can help you to exploit this vulnerability. There are few security researchers who successfully found and reported this bug to the company. One of the security researcher is Jobert Abma who wrote a very detailed report - you can read the proof of concept and try to understand this vulnerability. Here is the URL of that POC report: hackerone.com/reports/128085
@@cyber.security.training thanks brother 🤩✌🔥
english?????
🙏