(+91) 704-174-0267
[email protected]
My Account
CyberPedia logo
CyberPedia
  • Home
  • About Us
  • Our Course
    • Skilled Based Courses
      • Advanced Course
      • Beginner Course
      • Master Course
    • Job Guarantee
      • Offensive Security Analyst
      • VAPT Consultant Course
      • Cyber Security Analyst Offense Course
    • Certification Course
      • bug bounty course
  • CyberPedia App
  • Our Partners
  • Our Blog
  • Contact
  • Home
  • About Us
  • Our Course
  • CyberPedia App
  • Our Partners
  • Our Blog
  • Contact

BurpSuite 102: Dashboard Overview

Posted on September 2, 2024
No Comments

 

The first tab that should be open is the Dashboard tab, but keep in mind that you can drag these tabs around so the order of your tabs may not match mine. I recommend putting them in an order that fits your workflow.

 

The Tasks section is where you can keep track of ongoing scans and processes.

Note: This two features (Issue activity &  Advisory) are available for the burpsuite professional version.

The Issue activity section is where you can see the findings from your scans.

Finding confidence is shown by how filled in the circle around the “!” is, a tentative finding that may be a false positive will be an outline, while certain findings are filled in completely. Finding severity is shown by color, with the highest severity being red.

The Advisory section shows more info about each finding.

The information for each finding will go into detail about the vulnerability, including links for further information. You can also select the tabs at the top of the section to see the request and response that indicated the finding, as well as a path to the issue where applicable like showing where the sources and sinks for prototype pollution show up in the site’s source code.

The Live passive crawl from proxy (all traffic about the websites) section is where you can see the summary of website (like Host, HTTP Request method, URL, Response status code and MIME) and Task configuration (like task type, scope, Task progress)

The event log shows basic activity information about things like scans and other processes.

In our next blog, we’ll shift our focus to the Target component of BurpSuite. We’ll explore how to effectively define and manage targets, as well as discuss advanced techniques for identifying and exploiting vulnerabilities.

Thank you for reading, and as always, happy testing!

Author

  • Rushik Patel
    Rushik Patel

    View all posts
Previous Post
BurpSuite 101 : Introduction to BurpSuite
Next Post
Burp 103 : Target Component

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.
You need to agree with the terms to proceed

Recent Posts

  • Insecure Deserialization Attacks October 14, 2024
  • HTTP Desync Attacks, Also known as HTTP Request Smuggling September 18, 2024
  • A Nerd’s Guide To Cracking CTF Challenges Part-1 September 17, 2024
  • Burp 107: BurpSuite Decoder, Sequencer and Comparer September 13, 2024
  • Burp 106: BurpSuite Intruder for Application Security Testing September 11, 2024

Categories

  • Cloud (2)
  • CTF (1)
  • Red Team (5)
  • Uncategorized (1)
  • Web (9)
Cyber Security Internship and training

Contacts

[email protected]
+91 91046 20267
215-216, 2nd floor, Pushti Sparsh Acade, BRTS Stop, opposite Rathi Apartment, Dharm Nagar II, Sabarmati, Ahmedabad, Gujarat 380005
Facebook
Instagram
YouTube

Quick Links

  • About Us
  • Contact Us
  • Privacy Policy
  • Terms of Service
  • Refund Policy
  • Cancellation Policy
  • Pricing Policy

Download