As a quick summary, we have seen the different stages of an application pentest and we will now start looking at the different vulnerabilities and how we can use Burp to find those vulnerabilities. Along with this, we have also seen the different functions available in Burp and what configurations are made available to the user to easily use the proxy interception.
In the next chapter we will be planning the approach to application penetration testing