- Burp Suite Essentials
- Akash Mahajan
- 153字
- 2021-08-05 17:03:38
Chapter 3. Setting the Scope and Dealing with Upstream Proxies
In the preceding chapter, we saw how to set up Mozilla Firefox with the FoxyProxy Standard add-on to create a selective, pattern-based forwarding process. This allows us to ensure that only white-listed traffic from our browser reaches Burp. This is something that Burp allows us to set with its configuration options itself. Think of it like this: less traffic reaching Burp ensures that Burp is dealing with legitimate traffic, and its filters are working on ensuring that we remain within our scope.
As a security professional testing web application, scope is a term you hear and read about everywhere. Many times, we are expected to test only parts of an application, and usually, the scope is limited by domain, subdomain, folder name, and even certain filenames. Burp gives a nice, simple-to-use interface to add, edit, and remove targets from the scope.
- 云原生安全:攻防實踐與體系構建
- Extending Symfony2 Web Application Framework
- CTF實戰:技術、解題與進階
- 數據恢復方法及案例分析
- 網絡空間攻防技術原理
- 計算機使用安全與防護
- 數據保護:工作負載的可恢復性
- VMware vCloud Security
- Cybersecurity Threats,Malware Trends,and Strategies
- 復雜信息系統網絡安全體系建設指南
- 網絡空間安全體系
- 惡意軟件、Rootkit和僵尸網絡
- INSTANT Penetration Testing:Setting Up a Test Lab How-to
- 數據中心安全防護技術
- 網絡安全滲透測試