|
|
|
|
LEADER |
00000cgm a22000007a 4500 |
001 |
OR_on1244274041 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o c |
007 |
cr cn||||||||| |
007 |
vz czazuu |
008 |
100321s2021 xx --- o vleng d |
040 |
|
|
|a TOH
|b eng
|c TOH
|d AU@
|d OCLCO
|d NZCPL
|d OCLCF
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 1242403214
|a 1260704179
|a 1305868987
|
020 |
|
|
|a 9781801079419
|
020 |
|
|
|a 1801079412
|
024 |
8 |
|
|a 9781801079419
|
029 |
1 |
|
|a AU@
|b 000068857771
|
035 |
|
|
|a (OCoLC)1244274041
|z (OCoLC)1242403214
|z (OCoLC)1260704179
|z (OCoLC)1305868987
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Cosentino, Scott,
|e author.
|
245 |
1 |
0 |
|a Web Application Hacking with Burp Suite /
|c Cosentino, Scott.
|
250 |
|
|
|a 1st edition.
|
264 |
|
1 |
|b Packt Publishing,
|c 2021.
|
300 |
|
|
|a 1 online resource (1 video file, approximately 2 hr., 10 min.)
|
336 |
|
|
|a two-dimensional moving image
|b tdi
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a video file
|
365 |
|
|
|b 119.99
|
520 |
|
|
|a Learn essential techniques with Burp Suite to detect vulnerabilities that cause web applications to be compromised About This Video Learn how to find and exploit common vulnerabilities with Burp Learn how Burp Suite can help automate attacks Learn using hands-on examples In Detail Burp Suite contains an array of penetration testing and vulnerability finder tools. It is mainly used to identify the vulnerabilities of web applications. In this course, you will learn essential techniques with Burp Suite to detect vulnerabilities that cause web applications to be compromised. The course starts off with demonstrating how to set up your project in Burp Suite. It also introduces the different modules included in the Burp Suite. You'll learn to identify information disclosure vulnerability and expose sites leaking sensitive information. You'll also learn about insecure decentralization vulnerability and how this can be exposed. Web applications use WebSocket to communicate with the user. Testing web sockets for vulnerabilities is also covered in this course. You'll also learn how to simulate the directory traversal attack and read files that are running. Finally, you will learn about some other attacks such as the external entity injection (XXE), cross-site scripting (XSS), and SQL injections. With this, you will have all the skills in your arsenal to test web applications.
|
542 |
|
|
|f Packt Publishing
|g 2021
|
550 |
|
|
|a Made available through: Safari, an O'Reilly Media Company.
|
588 |
0 |
|
|a Online resource; Title from title screen (viewed February 26, 2021).
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
710 |
2 |
|
|a O'Reilly for Higher Education (Firm),
|e distributor.
|
710 |
2 |
|
|a Safari, an O'Reilly Media Company.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/9781801079419/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
936 |
|
|
|a BATCHLOAD
|
994 |
|
|
|a 92
|b IZTAP
|