


These both include a vulnerability scanner that automates testing. The two paid plans of Burp Suite are called the Professional Edition and the Enterprise Edition. All three elements can be resident on the same computer. The package works with a Web browser, and the penetration tester intercepts traffic between the Web server and the browser. The operating mechanism of Burp Suite is as a Web proxy. Users of the free version, the Community Edition, can see the paid tools but the buttons that launch them are disabled. The lowest plan is free, and that only includes penetration testing tools.

All three editions are delivered with the same interface. Burp Suite is offered in three editions, and the higher-priced versions add on more automated systems. The system includes penetration testing utilities for Web applications and a vulnerability scanner. We have fixed a bug that prevented some event log messages from being displayed correctly.Burp Suite, from PortSwigger Ltd, is a package of system testing tools accessed from a single interface.The dynamic analysis timer now starts once the page is loaded and the analysis itself starts. We have fixed a bug whereby dynamic analysis was frequently timing out due to the system not factoring in the time that the page took to load.We have upgraded Burp's browser to Chromium 1.134. The original approach was used as a means of tracking requests, but is no longer needed. We have amended Burp's browser so that it respects the configured User-Agent header when scanning rather than generating a random User-Agent string. For more information on this vulnerability, see the new "Client side prototype pollution" issue definition that has been added to the Target > Issue definitions page. This button is highlighted when a tab has specific settings configured.Ĭlient-side prototype pollution reporting in Burp Scannerīurp Scanner can now detect client-side prototype pollution. You can return a tab to global settings by clicking the new Restore global defaults button.

If you select specific options for a tab then Repeater ignores the global settings for that tab altogether. To configure tab-specific options, click the new settings icon next to the Send button. You can now set tab-specific Repeater options, giving you finer control over how Repeater behaves when sending requests and receiving responses. It also provides a change to the way Burp's browser handles the User-Agent header and a minor bug fix. This release introduces tab-specific options in Repeater and client-side prototype pollution reporting in Burp Scanner.
