官术网_书友最值得收藏!

Executing an Application Penetration Test

Now that we have learned how to configure and set up our Burp Proxy across various platforms, we can now begin to start with an application pentest. In the present world, there are various purposes behind executing a pentest; it could either be for a bug bounty or it could be a fully-fledged assessment for a client. The initial approach is usually the same; ultimately, however, there is a huge difference. Bug bounty hunters aim to find one or a set of particular vulnerabilities that could lead to severe adversities if exploited, so they can claim their bounty.

On the other hand, for a fully-fledged pentest, the job of the pentester does not stop there. The pentester will have to perform a complete assessment and find the different possible flaws in the application, and for such a situation, a complete analysis of the application needs to be done. In this chapter, we are going to first understand why the basic scan is not enough, after which we will learn the different capabilities supported by Burp and how it helps in a very effective pentest.

We will cover the following topics in this chapter:

  • Difference between a bug bounty and a client-initiated pentest
  • Initiating a penetration test
  • Why Burp Suite? Let's cover some groundwork!
  • Why Burp Suite Scanner?

主站蜘蛛池模板: SHOW| 陕西省| 偃师市| 洛川县| 阿图什市| 普兰县| 渝中区| 万源市| 松溪县| 玉门市| 五华县| 东光县| 惠东县| 满洲里市| 大新县| 正蓝旗| 沅陵县| 囊谦县| 宽甸| 仙游县| 老河口市| 香港| 柳江县| 刚察县| 永登县| 大理市| 临夏县| 恭城| 宁化县| 桐庐县| 蚌埠市| 白城市| 张家川| 华池县| 工布江达县| 洛隆县| 新蔡县| 拜泉县| 永寿县| 舟曲县| 紫云|