logo

Keep Good Company and You Shall be of The Number

RenovaBT, one of the most experienced a “True” Value-added Distributor in Turkiye and neighbourhood countries in the region, is recognized as the Trusted Advisor with having a forefront portfolio of 15+ technology vendors
info@renovabt.com
+90(312)6661349

Vendors

Burp Suite Professional Edition: scalable cybersecurity for every organization

Value Added Distribution > Burp Suite Professional Edition: scalable cybersecurity for every organization

Burp Suite Professional Edition: scalable cybersecurity for every organization

Burp Suite is a leading range of cybersecurity tools, brought to you by PortSwigger. We believe in giving our users a competitive advantage through superior research.

The Burp Suite family

Burp Suite is a leading range of cybersecurity tools, brought to you by PortSwigger. We believe in giving our users a competitive advantage through superior research.

The Burp Suite family

A global leader in the fight against cybercrime

Each new edition of Burp Suite shares a common ancestor. The DNA running through our family tree represents decades of excellence in research. As the industry has shown time and time again, Burp Suite is the tool you can trust with your online security.

Cyber-DNA

Burp Suite Enterprise Edition:
scalable cybersecurity for every organization

We designed Enterprise Edition with simplicity as a top priority. Discover easy scheduling, elegant reports and straightforward remediation advice – all in one powerful package.

Burp Suite Enterprise Edition Monitor

Burp Suite Professional:
power tools for security specialists

The toolkit that started it all. Find out why Burp Pro has been the penetration testing industry’s weapon of choice for well over a decade.

Burp Suite Professional Laptop

Burp Suite Community Edition:
a manual toolkit for investigating web security

Nurturing the next generation of WebSec professionals and promoting strong online security. Community Edition gives everyone access to the basics of Burp.

Burp Suite Community Edition Laptop

Product Features

Web vulnerability scanner Professional Edition

  • Coverage of over 100 generic vulnerabilities, such as SQL injection and cross-site scripting (XSS), with great performance against all vulnerabilities in the OWASP top 10.over 100 generic vulnerabilities
  • Burp’s cutting-edge web application crawler accurately maps content and functionality, automatically handling sessions, state changes, volatile content, and application logins.
  • Burp Scanner includes a full JavaScript analysis engine using a combination of static (SAST) and dynamic (DAST) techniques for detection of security vulnerabilities within client-side JavaScript, such a DOM-based cross-site scripting.
  • Burp has pioneered the use of highly innovative out-of-band techniques (OAST) to augment the conventional scanning model. The Burp Collaborator technology allows Burp to detect server-side vulnerabilities that are completely invisible in the application’s external behavior, and even to report vulnerabilities that are triggered asynchronously after scanning has completed.Out of band techniques
  • The Burp Infiltrator technology can be used to perform interactive application security testing (IAST) by instrumenting target applications to give real-time feedback to Burp Scanner when its payloads reach dangerous APIs within the application.
  • Burp’s scanning logic is continually updated with enhancements to ensure it can find the latest vulnerabilities and new edge cases of existing vulnerabilities. In recent years, Burp has been the first scanner to detect novel vulnerabilities pioneered by the Burp research team, including template injection and web cache poisoning.continually updated
  • All reported vulnerabilities contain detailed custom advisories. These include a full description of the issue, and step-by-step remediation advice. Advisory wording is dynamically generated for each individual issue, with any special features or remediation points accurately described.

Advanced manual tools

 

  • Use Burp project files to save your work incrementally in real-time, and pick up seamlessly where you left off.
  • Use the configuration library to quickly launch targeted scans with different settings.
  • View real-time feedback of all discovered vulnerabilities on Burp’s central dashboard.real time feedback
  • Place manual insertion points at arbitrary locations within requests, to inform the Scanner about non-standard inputs and data formats.
  • Use live scanning as you browse to fully control what actions are carried out for what requests.
  • Burp can optionally report all reflected and stored inputs, even where no vulnerability has been confirmed, to facilitate manual testing for issues like cross-site scripting.

 

  • You can export beautifully formatted HTML reports of discovered vulnerabilities.html reports
  • The CSRF PoC Generator function can be used to generate a proof-of-concept cross-site request forgery (CSRF) attack for a given request.
  • The Content Discovery function can be used to discover hidden content and functionality that is not linked from visible content that you can browse to.
  • The Target Analyzer function can be used to analyze a target web application and tell you how many static and dynamic URLs it contains, and how many parameters each URL takes.
  • Burp Intruder is an advanced tool for automating custom attacks against applications. It can be used for numerous purposes to improve the speed and accuracy of manual testing.
  • Intruder captures detailed attack results, with all relevant information about each request and response clearly presented in table form. Captured data includes the payload values and positions, HTTP status code, response timers, cookies, number of redirections, and the results of any configured grep or data extraction settings.
Date

October 23, 2015

Category

Vulnerability Management