In this article, I will present a method to avoid manual editing of the /etc/hosts file during penetration tests and security audits, utilizing the Burp Suite tool (this option is available in both Enterprise and Community versions). This technique not only enhances the efficiency of tests but also offers greater flexibility, which can be useful for bypassing WAFs such as Cloudflare, for example. The inspiration for this article came from a presentation by
@Agarri_FR, which showcases tricks for more effective use of Burp Suite.