目錄(91章)
倒序
- 封面
- 版權頁
- Credits
- About the Author
- Acknowledgments
- About the Reviewers
- www.PacktPub.com
- Support files eBooks discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Chapter 1. Getting Started with Burp
- Starting Burp from the command line
- Specifying memory size for Burp
- Ensuring that IPv4 is allowed
- Working with other JVMs
- Summary
- Chapter 2. Configuring Browsers to Proxy through Burp
- Configuring widely used browsers to proxy through Burp Suite
- Summary
- Chapter 3. Setting the Scope and Dealing with Upstream Proxies
- Multiple ways to add targets to the scope
- Scope and Burp Suite tools
- Scope inclusion versus exclusion
- Dropping out-of-scope requests
- Dealing with upstream proxies and SOCKS proxies
- Summary
- Chapter 4. SSL and Other Advanced Settings
- Importing the Burp certificate in Mozilla Firefox
- Importing the Burp certificate in Microsoft IE and Google Chrome
- Installing the Burp certificate in iOS or Android
- SSL pass-through
- Invisible Proxy
- Summary
- Chapter 5. Using Burp Tools As a Power User – Part 1
- Target
- Proxy
- The Message Analysis tab
- Actions on the intercepted requests
- Intruder
- Scanner
- Repeater
- Summary
- Chapter 6. Using Burp Tools As a Power User – Part 2
- Spidering
- Sequencer
- Decoder
- Comparer
- Alerts
- Summary
- Chapter 7. Searching Extracting Pattern Matching and More
- Filtering
- Matching
- Grep - Match and Grep - Extract
- Summary
- Chapter 8. Using Engagement Tools and Other Utilities
- Search
- Target Analyzer
- Content Discovery
- Task Scheduler
- CSRF proof of concept Generator
- Summary
- Chapter 9. Using Burp Extensions and Writing Your Own
- Setting up the Python runtime for Burp Extensions
- Setting up the Ruby environment for Burp Extensions
- Loading and installing a Burp Extension from the Burp App Store
- Loading and installing a Burp Extension manually
- Managing Burp Extensions
- Writing our own Burp Extensions
- Noteworthy Burp Extensions
- Summary
- Chapter 10. Saving Securely Backing Up and Other Maintenance Activities
- Saving and restoring a state
- Automatic backups
- Scheduled tasks
- Logging all activities
- Summary
- Chapter 11. Resources References and Links
- Primary references
- Web application security testing with Burp
- Miscellaneous security testing tutorials with Burp Suite
- Pentesting thick clients
- Testing mobile applications for web security using Burp Suite
- Extensions references
- Books
- Summary
- Index 更新時間:2021-08-05 17:03:55
推薦閱讀
- Android應用安全實戰:Frida協議分析
- 網絡安全與管理
- API攻防:Web API安全指南
- 數據安全實踐指南
- 軟件開發安全之道:概念、設計與實施
- Python Penetration Testing Cookbook
- 網絡安全技術與實訓(第4版)(微課版)
- 隱私計算
- Digital Forensics with Kali Linux
- 電腦安全與攻防入門很輕松(實戰超值版)
- SQL Injection Strategies
- Web安全攻防從入門到精通
- 密碼朋克:自由與互聯網的未來
- Developing Applications with Salesforce Chatter
- 網絡安全等級保護2.0:定級、測評、實施與運維
- 計算機網絡安全
- Securing Docker
- 2018—2019年中國網絡安全發展藍皮書
- 信息安全風險管理與實踐
- 網絡綜合項目實踐
- Schneier的安全忠告
- 數字化系統安全加固技術
- 信息安全技術專業基于工作過程支撐平臺課程體系開發實踐
- Hands-On Enterprise Application Development with Python
- Kali Linux 2018:Assuring Security by Penetration Testing
- 信息安全案例教程:技術與應用
- 網絡安全治理新格局
- ATT&CK框架實踐指南
- 響應式安全:構建企業信息安全體系
- 網絡安全態勢感知:提取、理解和預測