![]() ![]() ![]() Or you might need to load a particular configuration when working on a particular client engagement. For example, you might create different configurations for different types of scans. You can use Burp's configuration library to manage different Burp configurations for particular tasks. Any source code or other supplementary material referenced by the author in this book is available to readers on GitHub via the book’s product page, located at For more detailed information, please visit. ![]() For more information, reference our Print and eBook Bulk Sales web page at. eBook versions and licenses are also available for most titles. Apress titles may be purchased in bulk for academic, corporate, or promotional use. For information on translations, please e-mail for reprint, paperback, or audio rights, please e-mail. ![]() SSBM Finance Inc is a Delaware corporation. Managing Director, Apress Media LLC: Welmoed Spahr Acquisitions Editor: Divya Modi Development Editor: Laura Berendson Coordinating Editor: Divya Modi Cover designed by eStudioCalamar Cover image designed by Pixabay Distributed to the book trade worldwide by Springer Science+Business Media New York, 1 New York Plaza, Suite 4600, New York, NY 10004-1562, USA. Phone 1-800-SPRINGER, fax (201) 348-4505, e-mail, or visit Apress Media, LLC is a California LLC and the sole member (owner) is Springer Science + Business Media Finance Inc (SSBM Finance Inc). The publisher makes no warranty, express or implied, with respect to the material contained herein. While the advice and information in this book are believed to be true and accurate at the date of publication, neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors or omissions that may be made. The use in this publication of trade names, trademarks, service marks, and similar terms, even if they are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights. Rather than use a trademark symbol with every occurrence of a trademarked name, logo, or image we use the names, logos, and images only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark. Trademarked names, logos, and images may appear in this book. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. Pages 165-167 Citation previewĪ Complete Guide to Burp Suite Learn to Detect Application Vulnerabilities - Sagar Rahalkar A Complete Guide to Burp Suite Learn to Detect Application Vulnerabilities Sagar Rahalkar A Complete Guide to Burp Suite Sagar Rahalkar Pune, Maharashtra, India ISBN-13 (pbk): 978-1-4842-6401-0 ISBN-13 (electronic): 978-1-4842-6402-7 Copyright © 2021 by Sagar Rahalkar This work is subject to copyright. Pages i-xiii Introduction to Burp Suite (Sagar Rahalkar).Pages 1-10 Setting Up the Environment (Sagar Rahalkar).Pages 11-26 Proxy, User Options, and Project Options (Sagar Rahalkar).Pages 27-48 Dashboard, Target, and Engagement Tools (Sagar Rahalkar).Pages 49-65 Intruder (Sagar Rahalkar).Pages 67-78 Repeater, Comparer, Decoder, and Sequencer (Sagar Rahalkar).Pages 79-93 Infiltrator, Collaborator, Clickbandit, and CSRF PoC Generator (Sagar Rahalkar).Pages 95-110 Scanner and Reporting (Sagar Rahalkar).Pages 111-130 Extending Burp Suite (Sagar Rahalkar).Pages 131-145 Testing Mobile Apps and APIs with Burp Suite (Sagar Rahalkar).Pages 147-164 Back Matter. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |