4. Analyze and modify HTTPS headers
Once you are in Burp Suite and your firefox browser is set up to allow your local host as a proxy,
you can start intercepting traffic. This will be a very simple example of how you can view HTTP headers and modify them.
Go the the proxy tab and click on "Interceptor is off" to turn the interceptor on.
Now open your Firefox Browser and type in "Google.com"
This will start populating your Burp Suite with responses and not send them through unless you select them an click foward.
Go through the responses and find one where the hostname says: "google.com"
Then change the language header to: de, this will change the language of google to German
If the german google screen doesn't load, just keep fowarding the requests, use the foward all to speed up the process.
This is a small example, but in theory this could be used to test different HTTP headers and modify them
to test the web application for weaknesses, i.e. changing the request for certain authentication sessions or tokens.
which could allow someone to bypass a login screen.