Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Burp Suite Cookbook: Practical recipes to help you master web penetration testing with Burp Suite

Buy

Get hands-on experience of using Burp Suite to execute attacks and perform web assessments

Key Features

  • Use tools in Burp Suite to meet your web infrastructure security demands
  • Configure Burp to fine-tune the suite of tools specific to the target
  • Use Burp extensions to assist with various technologies commonly found in application stacks

Book Description

Burp Suite is a Java-based platform used for testing the security of your web applications, and has been adopted widely by professional enterprise testers. The Burp Suite Cookbook contains recipes to help you tackle challenges related to determining and exploring vulnerabilities in web applications.

The book's first few sections will help you understand how to uncover security flaws with various test cases for complex environments. After you've configured Burp for your environment, you will use Burp tools such as Spider, Scanner, Intruder, Repeater, and Decoder, among others, to resolve specific problems faced by pentesters. You'll also be able to work with Burp's various modes, in addition to performing operations on the web. Toward the concluding chapters, you'll explore recipes that target specific test scenarios and learn how to resolve them using best practices.

By the end of this book, you'll be up and running with deploying Burp for securing web applications.

What you will learn

  • Configure Burp Suite for your web applications
  • Perform authentication, authorization, business logic, and data validation testing
  • Explore session management and client-side testing
  • Understand unrestricted file uploads and server-side request forgery
  • Execute XML external entity attacks with Burp
  • Perform remote code execution with Burp

Who this book is for

If you are a security professional, web pentester, or software developer who wants to adopt Burp Suite for application security, this book is for you.

Table of Contents

  1. Getting Started with Burp Suite
  2. Getting to Know the Burp Suite of Tools
  3. Configuring, Spidering, Scanning, and Reporting with Burp
  4. Assessing Authentication Schemes
  5. Assessing Authorization Checks
  6. Assessing Session Management Mechanisms
  7. Assessing Business Logic
  8. Evaluating Input Validation Checks
  9. Attacking the Client
  10. Working with Burp Macros and Extensions
  11. Implementing Advanced Topic Attacks
(HTML tags aren't allowed.)

E-Health Care Information Systems: An Introduction for Students and Professionals
E-Health Care Information Systems: An Introduction for Students and Professionals
E-Health Care Information Systems is a comprehensive collection written by leading experts from a range of disciplines including medicine, health sciences, engineering, business information systems, and computing technology. It provides a theoretical framework with sound methodological approaches and is filled with numerous case examples. Topics...
Network Security: A Practical Approach (The Morgan Kaufmann Series in Networking)
Network Security: A Practical Approach (The Morgan Kaufmann Series in Networking)
Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay.
...
Joint Cognitive Systems: Foundations of Cognitive Systems Engineering
Joint Cognitive Systems: Foundations of Cognitive Systems Engineering
This book was written by pioneers in the field and offers a principled approach to studying human work with complex technology. … It seems destined to become a classic in the field.
- Books-on-Line

In the nine compact chapters of Joint Cognitive Systems (JCS), two recognized figures in the field of human factors provide an...


Viruses and Nanotechnology (Current Topics in Microbiology and Immunology)
Viruses and Nanotechnology (Current Topics in Microbiology and Immunology)
Viral nanoparticles (VNPs) serve as excellent nanobuilding blocks for materials design and fabrication. The main advantages are their nanometer-range size, the propensity to self-assemble into monodisperse nanoparticles of discrete shape and size, the high degree of symmetry and polyvalency, the relative ease of producing large quantities, the...
Professional VB 2005 (Programmer to Programmer)
Professional VB 2005 (Programmer to Programmer)
Professional VB 2005

As Microsoft's most popular programming language in the world, Visual Basic allows applications to be written with dramatically less code. Programmers can simply drag and drop controls, such as buttons and dialog boxes, and then define their appearance and behavior. With VB 2005, this language has finally made the leap to...

Blueprints Visual Scripting for Unreal Engine
Blueprints Visual Scripting for Unreal Engine

Build professional 3D games with Unreal Engine 4's Visual Scripting system

About This Book

  • Take your game designs from inspiration to a fully playable game that you can share with the world, without writing a single line of code.
  • Learn to use visual scripting to develop gameplay...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy