Previous Lecture Complete and continue  

  Usernames and Passwords Brute-Forcing using Burp