- Hands-On Bug Hunting for Penetration Testers
- Joseph Marshall
- 121字
- 2021-07-16 17:53:08
Using Burp
Now let's start Burp – the 4G part of the command is where we're specifying Burp Suite should run on 4 GB memory:
java -jar -Xmx4G "/Applications/Burp Suite Community Edition.app/Contents/java/app/burp/burpsuite_community_1.7.33-9.jar"
Since this is a mouthful, we can create a small wrapper script that will use the $@ variable to add any options we may want to pass, without making us rewrite our path to the .jar executable. Here's bootstrap_burp.sh:
#!/bin/sh
java -jar -Xmx3G "/Applications/Burp Suite Community Edition.app/Contents/java/app/burp/burpsuite_community_1.7.33-9.jar" $@
Now you can make the file executable and symlink it to /usr/local/bin or the appropriate utility so it's available in your $PATH:
chmod u+x bootstrap_burp.sh
sudo ln -s /Full/path/to/bootstrap_burp.sh /usr/local/bin/bootstrap_burp
This allows us to start the program with just bootstrap_burp.
推薦閱讀
- unidbg逆向工程:原理與實踐
- Mobile Forensics Cookbook
- Metasploit Penetration Testing Cookbook(Second Edition)
- 黑客攻防技巧
- INSTANT Windows PowerShell
- 諸神之眼:Nmap網絡安全審計技術揭秘
- 從實踐中學習密碼安全與防護
- 華為防火墻實戰指南
- 網絡服務安全與監控
- 捍衛隱私
- Cybersecurity Threats,Malware Trends,and Strategies
- Android Application Security Essentials
- 云計算安全:關鍵技術、原理及應用
- 黑客攻防入門
- Metasploit 5.0 for Beginners