舉報

會員
Hands-On Application Penetration Testing with Burp Suite
Burpsuiteisasetofgraphictoolsfocusedtowardspenetrationtestingofwebapplications.Burpsuiteiswidelyusedforwebpenetrationtestingbymanysecurityprofessionalsforperformingdifferentweb-levelsecuritytasks.Thebookstartsbysettinguptheenvironmenttobeginanapplicationpenetrationtest.Youwillbeabletoconfiguretheclientandapplytargetwhitelisting.YouwillalsolearntosetupandconfigureAndroidandIOSdevicestoworkwithBurpSuite.ThebookwillexplainhowvariousfeaturesofBurpSuitecanbeusedtodetectvariousvulnerabilitiesaspartofanapplicationpenetrationtest.Oncedetectioniscompletedandthevulnerabilityisconfirmed,youwillbeabletoexploitadetectedvulnerabilityusingBurpSuite.ThebookwillalsocoversadvancedconceptslikewritingextensionsandmacrosforBurpsuite.Finally,youwilldiscovervariousstepsthataretakentoidentifythetarget,discoverweaknessesintheauthenticationmechanism,andfinallybreaktheauthenticationimplementationtogainaccesstotheadministrativeconsoleoftheapplication.Bytheendofthisbook,youwillbeabletoeffectivelyperformend-to-endpenetrationtestingwithBurpSuite.
目錄(206章)
倒序
- coverpage
- Title Page
- Copyright and Credits
- Hands-On Application Penetration Testing with Burp Suite
- Contributors
- About the authors
- About the reviewer
- Packt is searching for authors like you
- About Packt
- Why subscribe?
- Packt.com
- Preface
- Who this book is for
- What this book covers
- To get the most out of this book
- Conventions used
- Get in touch
- Reviews
- Configuring Burp Suite
- Getting to know Burp Suite
- Setting up proxy listeners
- Managing multiple proxy listeners
- Working with non-proxy-aware clients
- Creating target scopes in Burp Suite
- Working with target exclusions
- Quick settings before beginning
- Summary
- Configuring the Client and Setting Up Mobile Devices
- Setting up Firefox to work with Burp Suite (HTTP and HTTPS)
- Setting up Chrome to work with Burp Suite (HTTP and HTTPS)
- Setting up Chrome proxy options on Linux
- Setting up Internet Explorer to work with Burp Suite (HTTP and HTTPS)
- Additional browser add-ons that can be used to manage proxy settings
- FoxyProxy for Firefox
- Proxy SwitchySharp for Google Chrome
- Setting system-wide proxy for non-proxy-aware clients
- Linux or macOS X
- Windows
- Setting up Android to work with Burp Suite
- Setting up iOS to work with Burp Suite
- Summary
- Executing an Application Penetration Test
- Differences between a bug bounty and a client-initiated pentest
- Initiating a penetration test
- Why Burp Suite? Let's cover some groundwork!
- Types and features
- Crawling
- Why Burp Suite Scanner?
- Auditor/Scanner
- Understanding the insertion points
- Summary
- Exploring the Stages of an Application Penetration Test
- Stages of an application pentest
- Planning and reconnaissance
- Client-end code analysis
- Manual testing
- Various business logic flaws
- Second-order SQL injection
- Pentesting cryptographic parameters
- Privilege escalation
- Sensitive information disclosures
- Automated testing
- Exploiting discovered issues
- Digging deep for data exfiltration
- Taking shells
- Reporting
- Getting to know Burp Suite better
- Features of Burp Suite
- Dashboard
- Target
- Proxy
- Intruder
- Repeater
- Comparer
- Sequencer
- Decoder
- Extender
- Project options
- User options
- Summary
- Preparing for an Application Penetration Test
- Setup of vulnerable web applications
- Setting up Xtreme Vulnerable Web Application
- Setting up OWASP Broken Web Application
- Reconnaissance and file discovery
- Using Burp for content and file discovery
- Testing for authentication via Burp
- Brute forcing login pages using Burp Intruder
- Testing for authentication page for SQL injection
- Summary
- Identifying Vulnerabilities Using Burp Suite
- Detecting SQL injection flaws
- Manual detection
- Scanner detection
- CO2 detection
- Detecting OS command injection
- Manual detection
- Detecting XSS vulnerabilities
- Detecting XML-related issues such as XXE
- Detecting SSTI
- Detecting SSRF
- Summary
- Detecting Vulnerabilities Using Burp Suite
- Detecting CSRF
- Detecting CSRF using Burp Suite
- Steps for detecting CSRF using Burp Suite
- Detecting Insecure Direct Object References
- Detecting security misconfigurations
- Unencrypted communications and clear text protocols
- Default credentials
- Unattended installations
- Testing information
- Default pages
- Detecting insecure deserialization
- Java Deserialization Scanner
- Detecting OAuth-related issues
- Detecting SSO protocols
- Detecting OAuth issues using Burp Suite
- Redirections
- Insecure storage
- Detecting broken authentication
- Detecting weak storage for credentials
- Detecting predictable login credentials
- Session IDs exposed in the URL
- Session IDs susceptible to session fixation attacks
- Time out implementation
- Session is not destructed after logout
- Summary
- Exploiting Vulnerabilities Using Burp Suite - Part 1
- Data exfiltration via a blind Boolean-based SQL injection
- The vulnerability
- The exploitation
- Performing exfiltration using Burp Suite
- Executing OS commands using an SQL injection
- The vulnerability
- Executing an out-of-band command injection
- SHELLING
- Stealing session credentials using XSS
- Exploiting the vulnerability
- Taking control of the user's browser using XSS
- Extracting server files using XXE vulnerabilities
- Exploiting the vulnerability
- Performing out-of-data extraction using XXE and Burp Suite collaborator
- Using Burp Suite to exploit the vulnerability
- Exploiting SSTI vulnerabilities to execute server commands
- Using Burp Suite to exploit the vulnerability
- Summary
- Exploiting Vulnerabilities Using Burp Suite - Part 2
- Using SSRF/XSPA to perform internal port scans
- Performing an internal port scan to the backend
- Using SSRF/XSPA to extract data from internal machines
- Extracting data using Insecure Direct Object Reference (IDOR) flaws
- Exploiting IDOR with Burp Suite
- Exploiting security misconfigurations
- Default pages
- Directory listings
- Scanning
- Mapping the application
- Using Intruder
- Default credentials
- Untrusted HTTP methods
- Using insecure deserialization to execute OS commands
- Exploiting the vulnerability
- Exploiting crypto vulnerabilities
- Brute forcing HTTP basic authentication
- Brute forcing it with Burp Suite
- Brute forcing forms
- Automation with Burp Suite
- Bypassing file upload restrictions
- Bypassing type restrictions
- Summary
- Writing Burp Suite Extensions
- Setting up the development environment
- Writing a Burp Suite extension
- Burp Suite's API
- Modifying the user-agent using an extension
- Creating the user-agents (strings)
- Creating the GUI
- The operation
- Executing the extension
- Summary
- Breaking the Authentication for a Large Online Retailer
- Remembering about authentication
- Large online retailers
- Performing information gathering
- Port scanning
- Discovering authentication weaknesses
- Authentication method analysis
- Weak storage for credentials
- Predictable login credentials
- Session IDs exposed in the URL
- Session IDs susceptible to session fixations attacks
- The session is not destructed after the logout
- Sensitive information sent via unprotected channels
- Summary
- Exploiting and Exfiltrating Data from a Large Shipping Corporation
- Discovering Blind SQL injection
- Automatic scan
- SQLMap detection
- Looking for entry points
- Using SQLMap
- Intruder detection
- Exploitation
- Summary
- Other Books You May Enjoy
- Leave a review - let other readers know what you think 更新時間:2021-07-02 12:17:14
推薦閱讀
- Node Security
- Learning Python for Forensics
- 可信計算3.0工程初步
- 黑客攻防技巧
- Preventing Digital Extortion
- 硬黑客:智能硬件生死之戰
- Testing and Securing Android Studio Applications
- 局域網交換機安全
- 軟件安全保障體系架構
- 人工智能安全(精裝版)
- Cybersecurity Threats,Malware Trends,and Strategies
- 網絡空間安全導論
- Mastering Malware Analysis
- 數字銀行安全體系構建
- Practical Mobile Forensics
- 紅藍攻防:技術與策略(原書第3版)
- 安全網絡構建
- Metasploit 5.0 for Beginners
- 網站入侵與腳本技術快速防殺
- 黑客防線2011合訂本(下半年)
- 商用密碼權威指南:技術詳解、產品開發與工程實踐
- Hands-On Network Forensics
- Mastering Blockchain
- 漏洞
- Hands-On Enterprise Application Development with Python
- 網絡靶場與攻防演練
- Kali Linux 2018:Assuring Security by Penetration Testing
- 網絡異常流量與行為分析
- 天地一體化信息網絡信息安全保障技術
- 網絡安全態勢感知:提取、理解和預測