![]() You can now set intermediate certificates when you add a new PKCS#11 certificate for hardware token and smart cards. Specify intermediate CA certificates for hardware tokens and smart cards For more information, see Startup behavior. Find this setting on the startup wizard, or in Settings > Suite > Startup behavior > Unrecognized project files. This is especially useful if you are opening project files that came from unknown or untrusted sources. If you deselect Trust this project, Burp can now remove potentially harmful settings that could be configured within project files. We've introduced a new startup setting that enables you to trust or untrust projects. For more information, see HTTP/1 connection reuse. Find this in Intruder > Settings > HTTP/1 connection reuse. This can greatly increase the speed of your attacks when using HTTP/1, as Burp does not need to open a new connection for each request and close it after receiving a response. You can now control whether Intruder reuses connections to issue multiple HTTP/1 requests. ![]() Reuse HTTP/1 connections in Intruder to speed up attacks We have also made several minor improvements and fixed a few bugs. In Burp Scanner, we have introduced a new project-level Crawl paths tab in the Target tool, and support for GraphQL introspection during scans. This release introduces the ability to reuse HTTP/1 connections in Intruder, specify intermediate CA certificates when authenticating using hardware tokens and smart cards, safely open third-party project files, and set custom SNI values in Repeater. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |