

Rules are processed in order, top to bottom. Each rule has a logical operator that applies to it (and/or), a field to check for a match, and what conditions must be met for that field to be a match. Each rule can be individually toggled on or off. In those sections you can add rules to a list, to define what traffic gets intercepted. You can enable server response intercepts here if you wish. By default, only client requests are intercepted. The Options page has a section for client requests and a section for server responses. The Burp Proxy supports rules to filter which traffic is intercepted, so that if there are a very large number of requests, only the relevant requests are intercepted. The first Burpsuite tutorial on intercepting traffic demonstrates how this can be used to exploit a vulnerable e-commerce shopping site. The content of requests can also be modified before the request is forwarded. You will see all requests that are made as part of loading a page, so if there are multiple API calls being made, you'll see each one as a separate request. Once you do that, you'll see each request come up as it is happening in the browser, and you can Forward the request or Drop it. When you open the browser, it will not intercept traffic by default, you have to click "Intercept Off" to switch it to "Intercept On". You can open the Chromium browser included with Burp, which will use the Burp proxy. One basic use of Burp is intercepting traffic. It also has a built-in Chromium browser that passes all of its traffic through the proxy so that it can be inspected. The Burp Proxy is a proxy server built into Burp that has its own private certificate authority. Burp Collaborator client: work manually with Burp Collaborator payloads.Burp Clickbandit: generating clickjacking attacks copy script into browser, walk through sequence of actions you want victim to take, Clickbandit generates a PoC clickjacking attack.Burp Infiltrator: dynamic analysis tool, can run a Burp-instrumented binary and disover potentially unsafe APIs on the server side.Configuration Library: maintain separate configurations for different tools.Search: searches all of Burp's tools and items for particular expressions.Extender: customizes Burp's behavior using extensions you wrote yourself using Burp's API, or extensions from the BApp Store.Comparer: word- or byte-level comparison of two pieces of data.Decoder: decode or encode data from various formats (URL encoding, base64 encoding, etc.).Sequencer: analyzes the randomness of various random data/tokens collects large amount of data and runs statistical tests.Repeater: used to take a request, modify it, and send it, over and over.Intruder: automating custom attacks by sending a request into Intruder, and configuring details of the payload.Options: define all of the settings of the proxy server.History: view all the requests made as part of the session.Proxy: intercept, view, and modify traffic via the browser.Target Scope: specify details about targets, allows driving highly configured scans.Target: view and explore all data captured from scans or Burp Proxy browser sessions.Dashboard: view and configure automated tasks, scans view results from scan.

I tried upgrading jarwrapper, and that did the trick: It seemed like it should have been working fine.
BURP SUITE REPEATER HISTORY INSTALL
I used aptitude to install the openjdk-11-jre package, and that's the package causing the above error. Burp has not been fully tested on this platform and you may experience problems." "Your JRE appears to be version 11.0.14 from Debian. Ran into a problem with the Burp Suite community edition: Sudo dpkg -i burpsuite_1.7.30-0kali1_all.deb Use KaliTools to install burpsuite on a non-Kali machine: The jarwrapper library is required to install burpsuite:
BURP SUITE REPEATER HISTORY MAC
Use the Mac installer provided by portswigger: Debian Linux Dependencies

1.2.2 Installing burpsuite with KaliTools.
