- Hands-On Application Penetration Testing with Burp Suite
- Carlos A. Lozano Dhruv Shah Riyaz Ahemed Walikar
- 222字
- 2021-07-02 12:16:35
Executing an Application Penetration Test
Now that we have learned how to configure and set up our Burp Proxy across various platforms, we can now begin to start with an application pentest. In the present world, there are various purposes behind executing a pentest; it could either be for a bug bounty or it could be a fully-fledged assessment for a client. The initial approach is usually the same; ultimately, however, there is a huge difference. Bug bounty hunters aim to find one or a set of particular vulnerabilities that could lead to severe adversities if exploited, so they can claim their bounty.
On the other hand, for a fully-fledged pentest, the job of the pentester does not stop there. The pentester will have to perform a complete assessment and find the different possible flaws in the application, and for such a situation, a complete analysis of the application needs to be done. In this chapter, we are going to first understand why the basic scan is not enough, after which we will learn the different capabilities supported by Burp and how it helps in a very effective pentest.
We will cover the following topics in this chapter:
- Difference between a bug bounty and a client-initiated pentest
- Initiating a penetration test
- Why Burp Suite? Let's cover some groundwork!
- Why Burp Suite Scanner?
- 攻守道:企業(yè)數(shù)字業(yè)務(wù)安全風(fēng)險(xiǎn)與防范
- SASE原理、架構(gòu)與實(shí)踐
- 數(shù)字身份與元宇宙信任治理
- CSO進(jìn)階之路:從安全工程師到首席安全官
- 深入淺出隱私計(jì)算:技術(shù)解析與應(yīng)用實(shí)踐
- INSTANT Windows PowerShell
- 同態(tài)密碼學(xué)原理及算法
- 從實(shí)踐中學(xué)習(xí)Kali Linux滲透測(cè)試
- 數(shù)據(jù)安全領(lǐng)域指南
- 學(xué)電腦安全與病毒防范
- Kerberos域網(wǎng)絡(luò)安全從入門到精通
- 解密數(shù)據(jù)恢復(fù)
- INSTANT Apple Configurator How-to
- Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager
- Mastering Linux Security and Hardening