What does hacking actually LOOK like? For example, what interface is the hacker using, what’s their goal, and are they typing in a bunch of passwords like in the movies?
I test web applications for vulnerabilities, and I use a web browser and Burp Suite. It looks like a table with all the requests the browser does. Occasionally I slightly edit a request and send it again. Sometimes I just edit the URL in the browser.
Latest Answers