Professional Documents
Culture Documents
Attack
Attack
Attack
DICTIONARY ATTACK
Intruder
STEP- 2
Once on your Intruder Tab, you will see the IP, and the port you
want to attack gets to fill in automatically.
In case, if you did not make the request (as in step 1), you can
manually put the information here under the “target” tab.
Cyber Writes DICTIONARY ATTACK
Now turn to the “position” tab. This is the same request (or
information of raw packet) that you made before.
The highlights here are the “potential injection” points marked
by the BurpSuite.
These are some of the steps, but not limited to these, which can
strengthen the protection against these attacks.