- Burp Suite Essentials
- Akash Mahajan
- 184字
- 2021-08-05 17:03:36
Conventions
In this book, you will find a number of styles of text that distinguish between different kinds of information. Here are some examples of these styles, and an explanation of their meaning.
Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "The official documentation cautions users from double-clicking on the .jar
file."
A block of code is set as follows:
# Since we didn't get a request, we will look at response. responseInfo = self._helpers.analyzeResponse(self._helpers.bytesToString(messageInfo.getResponse())) # Many times, we figure out next steps based on the status code of the response. self._stdout.println(responseInfo.getStatusCode())
Any command-line input or output is written as follows:
java -jar -Xmx2048M /path/to/burpsuite.jar java -jar -Xmx2G /path/to/burpsuite.jar
New terms and important words are shown in bold. Words that you see on the screen, in menus or dialog boxes for example, appear in the text like this: "We need the JRE, so click on the Download button under JRE."
Note
Warnings or important notes appear in a box like this.
Tip
Tips and tricks appear like this.
- RESTful Java Web Services Security
- INSTANT Netcat Starter
- 網(wǎng)絡(luò)安全應(yīng)急管理與技術(shù)實踐
- 網(wǎng)絡(luò)空間安全:管理者讀物
- 等級保護測評理論及應(yīng)用
- Web安全與攻防入門很輕松(實戰(zhàn)超值版)
- INSTANT Windows PowerShell
- API攻防:Web API安全指南
- 防火墻技術(shù)與應(yīng)用(第2版)
- 網(wǎng)絡(luò)安全技術(shù)與實訓(xùn)(第4版)(微課版)
- 物聯(lián)網(wǎng)安全滲透測試技術(shù)
- 先進云安全研究與實踐
- SQL Injection Strategies
- Learning Pentesting for Android Devices
- 華為Anti-DDoS技術(shù)漫談