- Burp Suite Essentials
- Akash Mahajan
- 109字
- 2021-08-05 17:03:38
Summary
We successfully intercepted traffic from our browser to Burp Suite. This allows Burp Suite to see each and every request that leaves our browser. For our toolchain, we can use Firefox with the FoxyProxy Standard add-on and ensure that only selective traffic can be sent to Burp Suite. We also configured Internet Explorer, Chrome, and Firefox to proxy traffic through Burp Suite and now, we are ready to go ahead.
The next logical step is to set the scope for our security assessment. While doing assessments, sometimes we need to go through white-listed IP addresses using upstream proxies with Burp. We will cover that in the next chapter.
推薦閱讀
- unidbg逆向工程:原理與實踐
- Enterprise Cloud Security and Governance
- Penetration Testing with Perl
- API攻防:Web API安全指南
- Testing and Securing Android Studio Applications
- Spring Security(Third Edition)
- 黑客攻防與網絡安全從新手到高手(絕招篇)
- 隱私計算
- 網絡安全能力成熟度模型:原理與實踐
- 從0到1:CTFer成長之路
- 云原生安全技術實踐指南
- 安全防御入門手冊
- 數據安全與流通:技術、架構與實踐
- INSTANT Apple Configurator How-to
- Learning Pentesting for Android Devices