a) SQL injection payloads
Burp suite consists of SQL injection payloads that can easily crash an
injected database to enter into the system.
b) XSS payloads
XSS is one of the most frequent web application vulnerabilities and can be
easily found out using the XSS commands present in the burp suite.
c) custom payloads
With this option, you can create payloads
that are random with the
alphabets and numbers. With this payload, you can create a lot of complex
crypto passwords that can be used to crack advanced systems.
d) Runtime payload
Usually, payloads are generated but if there are a lot of payloads that need
to be inserted you can use this payload to insert the list in the runtime
memory for faster execution.
e) recursive payloads
Recursion is a system that sends the payloads
in a varied significant
signature process. Although being insignificant of nature these payloads are
used to effect systems like cloud flare to get access.
After entering the required payloads enter into the next section to start the
brute-forcing process.
In the next interface select the numbers of threads and the speed on which
the payloads should be sent. Also, you can insert upstream proxies that will
change in random so that even if the intrusion detection systems block the
access you can access using other proxies. You can even use the tor system
proxies as upstream proxies for additional security and to avoid detection.
Now click the start button and you will get an interface that will let you
analyze the hacking process. If the login was successful you will get 200
success information in the status bar. If the login was not successful you
will get a 404 or 303 error. In this way, you
can easily hack a login web
page with a burp suite.
In the next section, we will discuss Metasploit one of the most famous
exploit binding software that can help us to spoof any system.