# Brup suite
###### tags: `burpSuite` `deelmind`
---
https://www.youtube.com/watch?v=IWWYNDiwYOA
[TOC]
# dashboard
It can give us some information on what is going on here

# Target
This is where we actually have the information we want to log or to work with.
# Filter scope of information


if we say yes.
we could stop getting the traffic that we don't want
# Proxy
## Intercept
It just grabbed a request the we browser is making.
Because our browser is already hooked into burp suite
FoxyProxy


## options
### HTTP 304 (do intercept response problems)
無需再次请求的内容,web 會直接使用缓存的contents
Reference
https://forum.portswigger.net/thread/response-doesn-t-show-any-piece-of-source-code-of-intercepted-website-778333f7

require non cache response (Request不使用 web cache )
那兩個都要勾
# Burp Suite HTTPS certification installed.
if we want to intercept https requests, we have to install the https certificate in our browser. To make sure that the brup suite can work with https requests
CA URL
```
http://burpsuite
```

Download it.
Next, we need to install it into the certificate area of our browser.

Go to the private and security page.

select the view certificates

import

check the two options

# tips and tricks
ctrl+U -> Html encode
# source
https://hackercat.org/burp-suite-tutorial/burp-suite-intruder-attack-type-and-payloads
---
# intruder
## payload type
### List


### Number
### Brute Force