Resource pools can be configured to limit the frequency of requests, so as not to overload network resources or the target. Intruder attacks are managed with resource pools in the same way as scans.This allows you to run multiple attacks in the background without needing to keep several windows open. Intruder attacks are no longer ended if the attack window is closed, and can be re-opened from the Dashboard's task list.The Dashboard's task list can filter tasks to show only scans or only Intruder attacks, to allow a granular view of your running tasks. Intruder attacks are now visible in the task list of the Dashboard.We have made several other improvements to Intruder. The title bar of an attack window shows whether it has been saved or not. An attack can be saved before, during, or after it has been performed. This is done on an opt-in basis: attacks are not saved by default, to avoid bloating project files. ![]() ![]() You can now save Intruder attacks to project files, so you can close Burp Suite and come back later to continue your attacks, or view the results of completed attacks. The release also includes other minor Burp Suite improvements. ![]() This release includes several improvements to Intruder, one of which allows you to save Intruder attacks to project files.
0 Comments
Leave a Reply. |