![]() ![]() A new payload type that generates Collaborator payloads, then inserts these at your configured payload positions.We have updated Burp Intruder to enable the use of Collaborator payloads in attacks. Collaborator payloads in Intruder attacks Intruder redirection configurations are now honored in the grep extract "fetch response" feature.This release introduces support for Collaborator payloads in Intruder attacks, some SPA scanning improvements, and more upgrades for the the Montoya API, and upgrades to the browser and JRE.Burp Suite now correctly handles HTTP/2 settings frames with zero initial window size.HTTP/2 will now be correctly used when testing macros within the macro editor.We fixed incorrect parsing of redirect URLs within meta tags. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |