|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
OR_ocn900292152 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
150116s2014 enka ob 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d E7B
|d OCLCF
|d DEBBG
|d YDXCP
|d DEBSZ
|d CEF
|d OCLCQ
|d UKMGB
|d UAB
|d DST
|d OCLCO
|d OCLCQ
|d OCLCO
|
015 |
|
|
|a GBB747282
|2 bnb
|
016 |
7 |
|
|a 018006658
|2 Uk
|
019 |
|
|
|a 907300539
|
020 |
|
|
|a 9781783550128
|
020 |
|
|
|a 1783550120
|
020 |
|
|
|a 1783550112
|
020 |
|
|
|a 9781783550111
|
020 |
|
|
|z 9781783550111
|
029 |
1 |
|
|a DEBBG
|b BV042490640
|
029 |
1 |
|
|a DEBSZ
|b 434838195
|
029 |
1 |
|
|a GBVCP
|b 817130535
|
029 |
1 |
|
|a UKMGB
|b 018006658
|
035 |
|
|
|a (OCoLC)900292152
|z (OCoLC)907300539
|
037 |
|
|
|a CL0500000527
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Mahajan, Akash,
|e author.
|
245 |
1 |
0 |
|a Burp Suite essentials :
|b discover the secrets of web application pentesting using Burp Suite, the best tool for the job /
|c Akash Mahajan.
|
246 |
3 |
0 |
|a Discover the secrets of web application pentesting using Burp Suite, the best tool for the job
|
264 |
|
1 |
|a Birningham, UK :
|b Packt Publishing,
|c [2014]
|
264 |
|
4 |
|c Ã2014
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Community experience distilled
|
588 |
0 |
|
|a Online resource; title from cover (Safari, viewed January 6, 2015).
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Cover; Copyright; Credits; About the Author; Acknowledgments; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Getting Started with Burp; Starting Burp from the command line; Specifying memory size for Burp; Specifying the maximum memory Burp is allowed to use; Ensuring that IPv4 is allowed; Working with other JVMs; Summary; Chapter 2: Configuring Browsers to Proxy through Burp; Configuring browsers to proxy through Burp Suite; Microsoft Internet Explorer; Google Chrome; Mozilla Firefox; Fine-grained proxy configuration; Mozilla Plug-n-Hack extension
|
505 |
8 |
|
|a Exclusive Firefox profileSummary; Chapter 3: Setting the Scope and Dealing with Upstream Proxies; Multiple ways to add targets to the scope; Loading a list of targets from a file; Scope and Burp Suite tools; Scope inclusion versus exclusion; Dropping out-of-scope requests; Dealing with upstream proxies and SOCKS proxies; Types of proxies supported by Burp; Working with SOCKS proxies; Using SSH tunneling as a SOCKS proxy; Setting up Burp to be a proxy server for other devices; Summary; Chapter 4: SSL and Other Advanced Settings; Importing the Burp certificate in Mozilla Firefox
|
505 |
8 |
|
|a Importing the Burp certificate in Microsoft IE and Google ChromeInstalling the Burp certificate in iOS or Android; SSL pass-through; Invisible Proxy; Summary; Chapter 5: Using Burp Tools As a Power User -- Part 1; Target; Site map compare; Proxy; The Message Analysis tab; Actions on the intercepted requests; Response interception and modification ; Using the Proxy history tab; Intruder; Scanner; Scanning optimization and requests; When to scan; Repeater; Summary; Chapter 6: Using Burp Tools As a Power User -- Part 2; Spidering; Sequencer; Analysis of the tokens; Sample analysis; Decoder
|
505 |
8 |
|
|a ComparerAlerts; Summary; Chapter 7: Searching, Extracting, Pattern Matching, and More; Filtering; Illustration; Matching; Grep -- Match and Grep -- Extract; Summary; Chapter 8: Using Engagement Tools and Other Utilities ; Search; Target Analyzer; Content Discovery; Task Scheduler; CSRF proof of concept Generator; Summary; Chapter 9: Using Burp Extensions and Writing Your Own; Setting up the Python runtime for Burp Extensions; Setting up the Ruby environment for Burp Extensions; Loading and installing a Burp Extension from the Burp App Store; Using BApp files
|
505 |
8 |
|
|a Loading and installing a Burp Extension manuallyManaging Burp Extensions; Memory issues with Burp Extensions; Writing our own Burp Extensions; A simple Burp Extension in Python; Noteworthy Burp Extensions; Summary; Chapter 10: Saving Securely, Backing Up, and Other Maintenance Activities; Saving and restoring a state; Automatic backups; Scheduled tasks; Logging all activities; Summary; Chapter 11: Resources, References, and Links; Primary references; Learning about Burp; Web application security testing with Burp; Miscellaneous security testing tutorials with Burp Suite
|
520 |
|
|
|a If you are interested in learning how to test web applications and the web part of mobile applications using Burp, then this is the book for you. It is specifically designed to meet your needs if you have basic experience in using Burp and are now aiming to become a professional Burp user.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Penetration testing (Computer security)
|
650 |
|
6 |
|a Tests d'intrusion.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Application Development.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Penetration testing (Computer security)
|2 fast
|
830 |
|
0 |
|a Community experience distilled.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781783550111/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10992758
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12188119
|
994 |
|
|
|a 92
|b IZTAP
|