Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Burp Suite Cookbook: Practical recipes to help you master web penetration testing with Burp Suite


Get hands-on experience of using Burp Suite to execute attacks and perform web assessments

Key Features

  • Use tools in Burp Suite to meet your web infrastructure security demands
  • Configure Burp to fine-tune the suite of tools specific to the target
  • Use Burp extensions to assist with various technologies commonly found in application stacks

Book Description

Burp Suite is a Java-based platform used for testing the security of your web applications, and has been adopted widely by professional enterprise testers. The Burp Suite Cookbook contains recipes to help you tackle challenges related to determining and exploring vulnerabilities in web applications.

The book's first few sections will help you understand how to uncover security flaws with various test cases for complex environments. After you've configured Burp for your environment, you will use Burp tools such as Spider, Scanner, Intruder, Repeater, and Decoder, among others, to resolve specific problems faced by pentesters. You'll also be able to work with Burp's various modes, in addition to performing operations on the web. Toward the concluding chapters, you'll explore recipes that target specific test scenarios and learn how to resolve them using best practices.

By the end of this book, you'll be up and running with deploying Burp for securing web applications.

What you will learn

  • Configure Burp Suite for your web applications
  • Perform authentication, authorization, business logic, and data validation testing
  • Explore session management and client-side testing
  • Understand unrestricted file uploads and server-side request forgery
  • Execute XML external entity attacks with Burp
  • Perform remote code execution with Burp

Who this book is for

If you are a security professional, web pentester, or software developer who wants to adopt Burp Suite for application security, this book is for you.

Table of Contents

  1. Getting Started with Burp Suite
  2. Getting to Know the Burp Suite of Tools
  3. Configuring, Spidering, Scanning, and Reporting with Burp
  4. Assessing Authentication Schemes
  5. Assessing Authorization Checks
  6. Assessing Session Management Mechanisms
  7. Assessing Business Logic
  8. Evaluating Input Validation Checks
  9. Attacking the Client
  10. Working with Burp Macros and Extensions
  11. Implementing Advanced Topic Attacks
(HTML tags aren't allowed.)

Conflict Resolution at Work For Dummies
Conflict Resolution at Work For Dummies

A practical workplace guide to handling conflict effectively

Managing employees and encouraging them to work together toward a common goal is an essential skill that all leaders should possess. Conflict Resolution at Work For Dummies provides the tools and advice you need to restore peace, train your colleagues to get along...

Beginning JavaFX
Beginning JavaFX

The open source JavaFX platform offers a Java-based approach to rich Internet application (RIA) development—an alternative to Adobe Flash/Flex and Microsoft Silverlight. At over 100 million downloads, the new JavaFX is poised to be a significant player now.

Written by a JavaFX engineer and developer, this book is one of the...

Real World Image Sharpening with Adobe Photoshop CS2
Real World Image Sharpening with Adobe Photoshop CS2
It's a sad but undeniable fact of life: Whether you scan, shoot, or capture, the process of digitizing images introduces softness, and to get great-looking results, you'll need to sharpen the great majority of digital images. The softness introduced during digitizing results from the very nature of the digitizing process. To represent images...

The Security Development Lifecycle
The Security Development Lifecycle
The software industry has been struggling with how to create and release software that is more security-enhanced and reliable— the Security Development Lifecycle (SDL) provides a methodology that works. Adapted from Microsoft's standard development process, SDL is a critical way to help reduce the number of security defects in code at every...
Provincial Life and the Military in Imperial Japan: The Phantom Samurai (Routledge Studies in the Modern History of Asia)
Provincial Life and the Military in Imperial Japan: The Phantom Samurai (Routledge Studies in the Modern History of Asia)

In contrast to the enduring stereotype of a ‘nation of samurai’, this book uses provincial newspapers and local records to hear the voices of ordinary people living in imperial Japan through several decades of war and peace. These voices reveal the authentic experiences, opinions and emotions of men, women and children. They show...

A Statistical Approach to Neural Networks for Pattern Recognition (Wiley Series in Computational Statistics)
A Statistical Approach to Neural Networks for Pattern Recognition (Wiley Series in Computational Statistics)
"The book provides an excellent introduction to neutral networks from a statistical perspective." (International Statistical Review, 2008)

"Successful connects logistic regression and linear discriminant analysis, thus making it critical reference and self-study guide for students and professionals alike in the...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy