- Burp Suite Essentials
- Akash Mahajan
- 153字
- 2021-08-05 17:03:38
Chapter 3. Setting the Scope and Dealing with Upstream Proxies
In the preceding chapter, we saw how to set up Mozilla Firefox with the FoxyProxy Standard add-on to create a selective, pattern-based forwarding process. This allows us to ensure that only white-listed traffic from our browser reaches Burp. This is something that Burp allows us to set with its configuration options itself. Think of it like this: less traffic reaching Burp ensures that Burp is dealing with legitimate traffic, and its filters are working on ensuring that we remain within our scope.
As a security professional testing web application, scope is a term you hear and read about everywhere. Many times, we are expected to test only parts of an application, and usually, the scope is limited by domain, subdomain, folder name, and even certain filenames. Burp gives a nice, simple-to-use interface to add, edit, and remove targets from the scope.
- 科技安全:戰略實踐與展望
- unidbg逆向工程:原理與實踐
- INSTANT Netcat Starter
- Mobile Forensics Cookbook
- 計算機使用安全與防護
- 網絡安全技術及應用(第3版)
- 從實踐中學習Kali Linux滲透測試
- 計算機網絡安全基礎(第5版)
- Digital Forensics with Kali Linux
- Hands-On Artificial Intelligence for Cybersecurity
- Instant OSSEC Host-based Intrusion Detection System
- BeagleBone for Secret Agents
- 計算機網絡安全與應用技術(第2版)
- 大數據時代的云安全
- 網站入侵與腳本技術快速防殺