- Web Penetration Testing with Kali Linux(Third Edition)
- Gilberto Najera Gutierrez Juned Ahmed Ansari
- 64字
- 2021-06-24 18:44:59
Customizing client interception
Specific rules can also be set if you want to narrow down the amount of web traffic that you intercept. As shown in the following screenshot, you can match requests for specific domains, HTTP methods, cookie names, and so on. Once the traffic is intercepted, you can then edit the values, forward them to the web server, and analyze the response:

推薦閱讀
- Linux設備驅(qū)動開發(fā)詳解:基于最新的Linux4.0內(nèi)核
- 嵌入式Linux開發(fā)技術
- Cybersecurity:Attack and Defense Strategies
- Linux操作系統(tǒng)基礎
- 構建可擴展分布式系統(tǒng):方法與實踐
- 計算機系統(tǒng)開發(fā)與優(yōu)化實戰(zhàn)
- 深入理解eBPF與可觀測性
- Linux系統(tǒng)安全基礎:二進制代碼安全性分析基礎與實踐
- OpenStack系統(tǒng)架構設計實戰(zhàn)
- 新編電腦辦公(Windows 10+ Office 2013版)從入門到精通
- Learn SwiftUI
- Windows 8完全自學手冊
- 再也不踩坑的kubernetes實戰(zhàn)指南
- 樹莓派+傳感器:創(chuàng)建智能交互項目的實用方法、工具及最佳實踐
- STM32庫開發(fā)實戰(zhàn)指南