<p/><br></br><p><b> Book Synopsis </b></p></br></br>Chapter 1: Introduction to Burp Suite<b>Chapter Goal: Introduce the Burp suite to the users explaining its need and a high-level overview. It would set the context for rest of the chapters.</b> <p><b>No of pages - 6-8</b> </p> <p><b>Subtopics</b></p> <p>1. Introduction to application security testing</p> <p>2. Some basics of application security</p> <p>3. A brief introduction to Burp Suite</p> <p>4. Need for Burp Suite</p> <p>5. Peer comparison </p> <p>6. Burp Suite features and versions</p> <p>7. High level feature overview</p> Chapter 2: Setting up the environment <p><b>Chapter Goal: Help the readers to setup the testing environment for rest of the chapters</b></p> <p><b>No of pages 6</b> </p> <p><b>Subtopics</b> <b></b></p> <p>1. Burp Suite installation</p> <p>2. Setting up vulnerable target web application</p> <p>3. Configuring the browser</p> 4. Using the Burp Suite CA certificate <p></p> Chapter 3: User options, project options, proxy <p><b>Chapter Goal: Introduce the readers to the user options, project options and proxy tab of Burp Suite. These are some basic building blocks to get started further.</b></p> <p><b>No of pages 20-25</b> </p> <p><b>Subtopics</b> <b></b></p> <p>1. Platform authentication, upstream proxy servers, SOCKS proxy</p> <p>2. Defining the hotkeys</p> 3. Automatic project backups<p></p> <p>4. Rest API</p> 5. Proxy interception, proxy history logging<p></p> <p>6. Performance feedback</p> <p>7. Project Options - Time outs, host name resolution, out of scope requests, redirections, TLS configuration, session handling rules, cookie jar and macros </p> <p>8. Proxy - Intercept, HTTP History, web socket history and options</p> <p><b>Chapter 4: Dashboard, target, engagement tools</b></p> <p><b>Chapter Goal: Introduce the readers to the dashboard, target tabs and the engagement tools</b></p> <p><b>No of pages</b> 10-15</p> <p><b>Subtopics</b></p> <p>1.Dashboard overview</p> <p>2.Target Tab - introduction to various panes, filters</p> <p>3.Engagement tools</p> Chapter 5: Intruder <p><b>Chapter Goal: Introduce the readers to the Burp Suite intruder tool. </b></p> <p><b>No of pages 10</b> </p> <p><b>Subtopics</b> <b></b></p> <p>1. Target tab</p> <p>2. Positions</p> <p>3. Payloads</p> <p>4. Options</p><p>Chapter 6: Repeater, sequencer, decoder and comparer</p> <p><b>Chapter Goal: Introduce the readers to repeater, sequencer, decoder and comparer</b> </p> <p><b>No of pages 10 - 15</b> </p> <p><b>Subtopics</b></p> <p>1. Repeater - request and response, search filters, show response and render</p> <p>2. Sequencer - Live capture, manual load and analysis options</p> <p>3. Decoder - Encoding, Decoding and Hashing</p> <p>4. Efficiently using comparer</p><p>Chapter 7: Infiltrator, Collaborator and Clickbandit</p> <p><b>Chapter Goal: Introduce the readers to infiltrator, collaborator and clickbandit tools</b> </p> <p><b>No of pages</b> 10-15</p> <p><b>Subtopics</b></p> <p>1. Infiltrator - patching the java binaries</p> <p>2.<p/><br></br><p><b> From the Back Cover </b></p></br></br>Use this comprehensive guide to learn the practical aspects of Burp Suite--from the basics to more advanced topics. The book goes beyond the standard OWASP Top 10 and also covers security testing of APIs and mobile apps.<p>Burp Suite is a simple, yet powerful, tool used for application security testing. It is widely used for manual application security testing of web applications plus APIs and mobile apps. The book starts with the basics and shows you how to set up a testing environment. It covers basic building blocks and takes you on an in-depth tour of its various components such as intruder, repeater, decoder, comparer, and sequencer. It also takes you through other useful features such as infiltrator, collaborator, scanner, and extender. And it teaches you how to use Burp Suite for API and mobile app security testing.</p><p>You will: <br></p><ul><li>Understand various components of Burp Suite</li><li>Configure the tool for the most efficient use</li><li>Exploit real-world web vulnerabilities using Burp Suite</li><li>Extend the tool with useful add-ons</li></ul><br><p/><br></br><p><b> About the Author </b></p></br></br><p><b>Sagar Rahalkar</b> is a seasoned information security professional with more than 13 years of experience in various verticals of information security. His domain expertise is mainly in AppsSec, cyber crime investigations, vulnerability assessments, penetration testing, and IT GRC. He holds a master's degree in computer science and several industry-recognized certifications such as CISM, ISO 27001LA, and ECSA. He has been closely associated with Indian law enforcement agencies for more than three years, dealing with digital crime investigations and related training, and received awards from senior officials of the police and defense organizations in India. He also is an author and reviewer for several publications.</p>
Price Archive shows prices from various stores, lets you see history and find the cheapest. There is no actual sale on the website. For all support, inquiry and suggestion messagescommunication@pricearchive.us