During our setup steps, we configured Burp proxy settings and browser settings, and learned the basics of Burp Suite that will be used for testing. We configured browser proxy settings using FoxyProxy, installed Burp's CA certificate, scanned a request, and showed how to use additional Burp tools that may be helpful in more target attacks, such as the Repeater, decoder, and Intruder.
With this knowledge, we can now start accessing embedded web applications for vulnerabilities on target devices using Burp Suite.