In CEH v13 Module 12: Hacking Web Applications, Burp Suite is introduced as a powerful proxy-based tool used for intercepting, modifying, and analyzing HTTP/S traffic between a client and a web application.
Key Features of Burp Suite:
Captures all HTTP requests and responses.
Allows for manual testing of input parameters, headers, and cookies.
Includes tools such as Intruder, Repeater, Scanner, and Decoder.
Helps detect vulnerabilities such as XSS, SQLi, CSRF, and insecure session handling.
Option Review:
A. Maskgen: Used for generating masks, not a web proxy.
B. Dimitry: A footprinting tool, not used for request/response testing.
C. Burpsuite: Correct. Designed for web application vulnerability analysis.
D. Proxychains: Used to chain proxies for anonymity, not for HTTP traffic analysis.
[Reference:, Module 12 – Web Application Testing Tools, CEH iLabs: Using Burp Suite for Manual Vulnerability Discovery, , , ]