Proxy analysis on mobile devices
Hello, I'm am an ethical hacker working for Ethical Intruder (ethicalintruder.com). I am running Burp Proxy and have gathered data from mobile devices. My question is this, what can I do with this information? Or rather, how do I analyze this data for vulnerabilities?
Thanks for your message.
Just to clarify, you have proxied the mobile application traffic via Burp?
If you have mapped the application you wish to test, you can run Burp Scanner to test the application for vulnerabilities.