Cargando…

Burp Suite essentials : discover the secrets of web application pentesting using Burp Suite, the best tool for the job /

If you are interested in learning how to test web applications and the web part of mobile applications using Burp, then this is the book for you. It is specifically designed to meet your needs if you have basic experience in using Burp and are now aiming to become a professional Burp user.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Mahajan, Akash (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birningham, UK : Packt Publishing, [2014]
Colección:Community experience distilled.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ii 4500
001 OR_ocn900292152
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 150116s2014 enka ob 001 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d E7B  |d OCLCF  |d DEBBG  |d YDXCP  |d DEBSZ  |d CEF  |d OCLCQ  |d UKMGB  |d UAB  |d DST  |d OCLCO  |d OCLCQ  |d OCLCO 
015 |a GBB747282  |2 bnb 
016 7 |a 018006658  |2 Uk 
019 |a 907300539 
020 |a 9781783550128 
020 |a 1783550120 
020 |a 1783550112 
020 |a 9781783550111 
020 |z 9781783550111 
029 1 |a DEBBG  |b BV042490640 
029 1 |a DEBSZ  |b 434838195 
029 1 |a GBVCP  |b 817130535 
029 1 |a UKMGB  |b 018006658 
035 |a (OCoLC)900292152  |z (OCoLC)907300539 
037 |a CL0500000527  |b Safari Books Online 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Mahajan, Akash,  |e author. 
245 1 0 |a Burp Suite essentials :  |b discover the secrets of web application pentesting using Burp Suite, the best tool for the job /  |c Akash Mahajan. 
246 3 0 |a Discover the secrets of web application pentesting using Burp Suite, the best tool for the job 
264 1 |a Birningham, UK :  |b Packt Publishing,  |c [2014] 
264 4 |c Ã2014 
300 |a 1 online resource (1 volume) :  |b illustrations. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Community experience distilled 
588 0 |a Online resource; title from cover (Safari, viewed January 6, 2015). 
504 |a Includes bibliographical references and index. 
505 0 |a Cover; Copyright; Credits; About the Author; Acknowledgments; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Getting Started with Burp; Starting Burp from the command line; Specifying memory size for Burp; Specifying the maximum memory Burp is allowed to use; Ensuring that IPv4 is allowed; Working with other JVMs; Summary; Chapter 2: Configuring Browsers to Proxy through Burp; Configuring browsers to proxy through Burp Suite; Microsoft Internet Explorer; Google Chrome; Mozilla Firefox; Fine-grained proxy configuration; Mozilla Plug-n-Hack extension 
505 8 |a Exclusive Firefox profileSummary; Chapter 3: Setting the Scope and Dealing with Upstream Proxies; Multiple ways to add targets to the scope; Loading a list of targets from a file; Scope and Burp Suite tools; Scope inclusion versus exclusion; Dropping out-of-scope requests; Dealing with upstream proxies and SOCKS proxies; Types of proxies supported by Burp; Working with SOCKS proxies; Using SSH tunneling as a SOCKS proxy; Setting up Burp to be a proxy server for other devices; Summary; Chapter 4: SSL and Other Advanced Settings; Importing the Burp certificate in Mozilla Firefox 
505 8 |a Importing the Burp certificate in Microsoft IE and Google ChromeInstalling the Burp certificate in iOS or Android; SSL pass-through; Invisible Proxy; Summary; Chapter 5: Using Burp Tools As a Power User -- Part 1; Target; Site map compare; Proxy; The Message Analysis tab; Actions on the intercepted requests; Response interception and modification ; Using the Proxy history tab; Intruder; Scanner; Scanning optimization and requests; When to scan; Repeater; Summary; Chapter 6: Using Burp Tools As a Power User -- Part 2; Spidering; Sequencer; Analysis of the tokens; Sample analysis; Decoder 
505 8 |a ComparerAlerts; Summary; Chapter 7: Searching, Extracting, Pattern Matching, and More; Filtering; Illustration; Matching; Grep -- Match and Grep -- Extract; Summary; Chapter 8: Using Engagement Tools and Other Utilities ; Search; Target Analyzer; Content Discovery; Task Scheduler; CSRF proof of concept Generator; Summary; Chapter 9: Using Burp Extensions and Writing Your Own; Setting up the Python runtime for Burp Extensions; Setting up the Ruby environment for Burp Extensions; Loading and installing a Burp Extension from the Burp App Store; Using BApp files 
505 8 |a Loading and installing a Burp Extension manuallyManaging Burp Extensions; Memory issues with Burp Extensions; Writing our own Burp Extensions; A simple Burp Extension in Python; Noteworthy Burp Extensions; Summary; Chapter 10: Saving Securely, Backing Up, and Other Maintenance Activities; Saving and restoring a state; Automatic backups; Scheduled tasks; Logging all activities; Summary; Chapter 11: Resources, References, and Links; Primary references; Learning about Burp; Web application security testing with Burp; Miscellaneous security testing tutorials with Burp Suite 
520 |a If you are interested in learning how to test web applications and the web part of mobile applications using Burp, then this is the book for you. It is specifically designed to meet your needs if you have basic experience in using Burp and are now aiming to become a professional Burp user. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Penetration testing (Computer security) 
650 6 |a Tests d'intrusion. 
650 7 |a COMPUTERS  |x Internet  |x Application Development.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Penetration testing (Computer security)  |2 fast 
830 0 |a Community experience distilled. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781783550111/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a ebrary  |b EBRY  |n ebr10992758 
938 |a YBP Library Services  |b YANK  |n 12188119 
994 |a 92  |b IZTAP