- Hands-On Application Penetration Testing with Burp Suite
- Carlos A. Lozano Dhruv Shah Riyaz Ahemed Walikar
- 311字
- 2021-07-02 12:16:30
Getting to know Burp Suite
Burp can be downloaded for all the major operating systems from the PortSwigger website at https://portswigger.net/burp. For Windows systems, both x64-bit and x32-bit installers are available. A standalone Java JAR file is also available in case you want to run Burp as a portable application.

When you start Burp Suite, you will be prompted to provide settings to set up your Burp project before you begin using the tool.
The three options available are as follows:
- Temporary project: Select this if you want to use Burp for a quick inspection or a task that you do not need to save. You can get started immediately when you select this option and hit Next.
- New project on disk: For a well-executed penetration test, it is very important to be able to record and retrieve logs of requests and responses that were part of the test. This option allows you to create a file on the disk that will store all the configuration data, requests, and responses, and proxy information that you set in Burp when you begin testing. A descriptive name can be provided to enable this file to be loaded in the future. A good rule of thumb is to create a name that provides information about the project itself. ClientName-TypeOfTest-DDMMYYYY is a good name to start with.
- Open existing project: This option allows you to load any existing project files that have been created in the past using the New project on disk option. You can choose to pause the spider and scanner modules so that the project is loaded in a non-active state of attack.
Clicking on Next will take you to a page where you can choose any save configuration from before or continue using Burp defaults. You also get the option of disabling extensions when Burp starts.

Click Start Burp to continue.
推薦閱讀
- Extending Symfony2 Web Application Framework
- 網(wǎng)絡(luò)安全與管理
- 工業(yè)互聯(lián)網(wǎng)安全防護與展望
- 隱私計算
- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- 信息安全導(dǎo)論(第2版)
- 網(wǎng)絡(luò)關(guān)鍵設(shè)備安全檢測實施指南
- 博弈論與數(shù)據(jù)安全
- 數(shù)據(jù)安全架構(gòu)設(shè)計與實戰(zhàn)
- Web代碼安全漏洞深度剖析
- 網(wǎng)絡(luò)安全監(jiān)控實戰(zhàn):深入理解事件檢測與響應(yīng)
- 計算機系統(tǒng)與網(wǎng)絡(luò)安全研究
- Kali Linux無線網(wǎng)絡(luò)滲透測試詳解
- Manga Studio 5 Beginner's Guide
- CTF網(wǎng)絡(luò)安全競賽入門教程