The Burp Methodology

This page contains links to all our step-by-step methodology articles.

  1. Using Burp to Bypass Client-Side Controls
  2. Using Burp to Attack Authentication
  3. Using Burp to Attack Session Management
  4. Using Burp to Test Access Controls
  5. Using Burp to Test for SQL Injection Flaws
  6. Using Burp to Find Cross-Site Scripting Vulnerabilities
  7. Cross-Site Scripting Filters
  8. Using Burp to Attack Back-End Components