- Burp Suite Essentials
- Akash Mahajan
- 184字
- 2021-08-05 17:03:36
Conventions
In this book, you will find a number of styles of text that distinguish between different kinds of information. Here are some examples of these styles, and an explanation of their meaning.
Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "The official documentation cautions users from double-clicking on the .jar
file."
A block of code is set as follows:
# Since we didn't get a request, we will look at response. responseInfo = self._helpers.analyzeResponse(self._helpers.bytesToString(messageInfo.getResponse())) # Many times, we figure out next steps based on the status code of the response. self._stdout.println(responseInfo.getStatusCode())
Any command-line input or output is written as follows:
java -jar -Xmx2048M /path/to/burpsuite.jar java -jar -Xmx2G /path/to/burpsuite.jar
New terms and important words are shown in bold. Words that you see on the screen, in menus or dialog boxes for example, appear in the text like this: "We need the JRE, so click on the Download button under JRE."
Note
Warnings or important notes appear in a box like this.
Tip
Tips and tricks appear like this.
- 計算機病毒分析與防范大全(第3版)
- Mastering Kali Linux for Advanced Penetration Testing
- Applied Network Security
- 硬黑客:智能硬件生死之戰
- Falco云原生安全:Falco原理、實踐與擴展
- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- 數據保護:工作負載的可恢復性
- 網絡服務安全與監控
- Web安全攻防從入門到精通
- 網絡空間安全法律問題研究
- Instant OSSEC Host-based Intrusion Detection System
- CTF網絡安全競賽入門教程
- AI+網絡安全:智網融合空間體系建設指南
- 大數據安全治理與防范:反欺詐體系建設
- Web應用安全威脅與防治