- Web Penetration Testing with Kali Linux(Third Edition)
- Gilberto Najera Gutierrez Juned Ahmed Ansari
- 63字
- 2021-06-24 18:44:59
Modifying requests on the fly
In the Match and Replace section, you can configure rules that will look for specific values in the request and edit it on the fly without requiring any manual intervention. Burp Proxy includes several of these rules. The most notable ones are used to replace the user agent value with that of Internet Explorer, iOS, or Android devices:

推薦閱讀
- 從零開(kāi)始寫(xiě)Linux內(nèi)核:一書(shū)學(xué)透核心原理與實(shí)現(xiàn)
- Linux內(nèi)核完全注釋?zhuān)?0周年版·第2版)
- 精解Windows 8
- Kubernetes網(wǎng)絡(luò)權(quán)威指南:基礎(chǔ)、原理與實(shí)踐
- Mastering KVM Virtualization
- 玩到極致 iPhone 4S完全攻略
- Mastering Reactive JavaScript
- Fedora 12 Linux應(yīng)用基礎(chǔ)
- NetDevOps入門(mén)與實(shí)踐
- AWS SysOps Cookbook
- Advanced Infrastructure Penetration Testing
- Learning BeagleBone
- Learn SwiftUI
- 大規(guī)模分布式系統(tǒng)架構(gòu)與設(shè)計(jì)實(shí)戰(zhàn)
- Android應(yīng)用性能優(yōu)化最佳實(shí)踐