Summary
This covers the complete groundwork of the Burp Scanner and crawler, giving us a complete idea of how the tool works and performs a scan to give an accurate result in different scenarios of web applications. Now, in the next chapter, we will start with the stages necessary for an application penetration testing.
推薦閱讀
- 數(shù)字身份與元宇宙信任治理
- 黑客攻防入門秘笈
- 工業(yè)控制網(wǎng)絡(luò)安全技術(shù)
- Kali Linux Wireless Penetration Testing Cookbook
- Building a Home Security System with BeagleBone
- 數(shù)據(jù)安全領(lǐng)域指南
- 信息安全導(dǎo)論(第2版)
- 博弈論與數(shù)據(jù)安全
- 網(wǎng)絡(luò)服務(wù)安全與監(jiān)控
- Bug Bounty Hunting Essentials
- 聯(lián)邦學(xué)習(xí)原理與算法
- Practical Mobile Forensics
- Instant OSSEC Host-based Intrusion Detection System
- Blockchain Development with Hyperledger
- 精通Metasploit滲透測試(第3版)