官术网_书友最值得收藏!

Executing an Application Penetration Test

Now that we have learned how to configure and set up our Burp Proxy across various platforms, we can now begin to start with an application pentest. In the present world, there are various purposes behind executing a pentest; it could either be for a bug bounty or it could be a fully-fledged assessment for a client. The initial approach is usually the same; ultimately, however, there is a huge difference. Bug bounty hunters aim to find one or a set of particular vulnerabilities that could lead to severe adversities if exploited, so they can claim their bounty.

On the other hand, for a fully-fledged pentest, the job of the pentester does not stop there. The pentester will have to perform a complete assessment and find the different possible flaws in the application, and for such a situation, a complete analysis of the application needs to be done. In this chapter, we are going to first understand why the basic scan is not enough, after which we will learn the different capabilities supported by Burp and how it helps in a very effective pentest.

We will cover the following topics in this chapter:

  • Difference between a bug bounty and a client-initiated pentest
  • Initiating a penetration test
  • Why Burp Suite? Let's cover some groundwork!
  • Why Burp Suite Scanner?

主站蜘蛛池模板: 大竹县| 安吉县| 洛隆县| 桐乡市| 阿克苏市| 庄浪县| 宁夏| 龙南县| 垫江县| 江油市| 黄大仙区| 门头沟区| 高邑县| 平乡县| 祥云县| 中方县| 莱西市| 金秀| 阜宁县| 皋兰县| 湖口县| 阳曲县| 华亭县| 宁南县| 灌云县| 高邑县| 南阳市| 台中市| 通化县| 成都市| 丁青县| 大连市| 丹江口市| 郧西县| 米脂县| 定结县| 稷山县| 西乌珠穆沁旗| 屏东市| 安泽县| 孟津县|