- Hands-On Application Penetration Testing with Burp Suite
- Carlos A. Lozano Dhruv Shah Riyaz Ahemed Walikar
- 222字
- 2021-07-02 12:16:35
Executing an Application Penetration Test
Now that we have learned how to configure and set up our Burp Proxy across various platforms, we can now begin to start with an application pentest. In the present world, there are various purposes behind executing a pentest; it could either be for a bug bounty or it could be a fully-fledged assessment for a client. The initial approach is usually the same; ultimately, however, there is a huge difference. Bug bounty hunters aim to find one or a set of particular vulnerabilities that could lead to severe adversities if exploited, so they can claim their bounty.
On the other hand, for a fully-fledged pentest, the job of the pentester does not stop there. The pentester will have to perform a complete assessment and find the different possible flaws in the application, and for such a situation, a complete analysis of the application needs to be done. In this chapter, we are going to first understand why the basic scan is not enough, after which we will learn the different capabilities supported by Burp and how it helps in a very effective pentest.
We will cover the following topics in this chapter:
- Difference between a bug bounty and a client-initiated pentest
- Initiating a penetration test
- Why Burp Suite? Let's cover some groundwork!
- Why Burp Suite Scanner?
- unidbg逆向工程:原理與實(shí)踐
- 黑客大曝光:無線網(wǎng)絡(luò)安全(原書第3版)
- Mobile Forensics Cookbook
- 特種木馬防御與檢測技術(shù)研究
- INSTANT Burp Suite Starter
- Testing and Securing Android Studio Applications
- 計(jì)算機(jī)網(wǎng)絡(luò)安全技術(shù)研究
- 計(jì)算機(jī)網(wǎng)絡(luò)安全基礎(chǔ)(第5版)
- Falco云原生安全:Falco原理、實(shí)踐與擴(kuò)展
- 互聯(lián)網(wǎng)企業(yè)安全高級指南
- 先進(jìn)云安全研究與實(shí)踐
- 數(shù)據(jù)安全架構(gòu)設(shè)計(jì)與實(shí)戰(zhàn)
- 網(wǎng)絡(luò)安全大數(shù)據(jù)分析與實(shí)戰(zhàn)
- 計(jì)算機(jī)網(wǎng)絡(luò)安全實(shí)驗(yàn)指導(dǎo)
- 信息系統(tǒng)安全等級化保護(hù)原理與實(shí)踐