- Hands-On Application Penetration Testing with Burp Suite
- Carlos A. Lozano Dhruv Shah Riyaz Ahemed Walikar
- 183字
- 2021-07-02 12:16:31
Working with target exclusions
Just as we can add items to scope in Burp, we can also add items that need to be explicitly set out of scope. This, as is the case with in-scope items, can be added via two methods. The first is via the Proxy | History tab from the right-click context menu:

The second is from the Target scope tab in the Exclude from scope section. For example, if you want to exclude all sub-directories and files under /javascript, then the following options can be applied:
- Protocol: HTTP
- Host or IP range: mutillidae-testing.cxm
- Port: ^80$
- File: ^/javascript/.*

This will exclude all URLs under the /javascript/ directory on port 80 with the HTTP protocol.
You can also load a file containing a list of URLs that need to be excluded from scope via the Load button on the Target | Scope page. This list must be URLs/targets separated by newlines.
Both the Include in scope option and Exclude from scope option are case insensitive. /javascript/, /JavaScript/, and /jAvAscrIPt/ all mean the same for the Target | Scope feature of Burp.
- Wireshark 2 Quick Start Guide
- 黑客攻防入門秘笈
- 走進新安全:讀懂網(wǎng)絡(luò)安全威脅、技術(shù)與新思想
- 黑客攻防與網(wǎng)絡(luò)安全從新手到高手(絕招篇)
- Falco云原生安全:Falco原理、實踐與擴展
- 物聯(lián)網(wǎng)安全滲透測試技術(shù)
- 軟件安全保障體系架構(gòu)
- CTF那些事兒
- 信息安全導(dǎo)論(第2版)
- 從實踐中學(xué)習(xí)密碼安全與防護
- 網(wǎng)絡(luò)安全態(tài)勢感知
- Kali Linux高級滲透測試(原書第4版)
- Mastering Malware Analysis
- Practical Mobile Forensics
- 計算機系統(tǒng)與網(wǎng)絡(luò)安全研究