Get hands-on experience in using Burp Suite to execute attacks and perform web assessmentsKey FeaturesExplore the tools in Burp Suite to meet your web infrastructure security demandsConfigure Burp to fine-tune the suite of tools specific to the targetUse Burp extensions to assist with different technologies commonly found in application stacksBook DescriptionBurp Suite is a Java-based platform for testing the security of your web applications and has been adopted widely by professional enterprise testers.The Burp Suite Cookbook contains recipes to tackle challenges in determining and exploring vulnerabilities in web applications. You will learn how to uncover security flaws with various test cases for complex environments. After you have configured Burp for your environment you will use Burp tools such as Spider Scanner Intruder Repeater and Decoder among others to resolve specific problems faced by pentesters. You will also explore working with various modes of Burp and then perform operations on the web. Toward the end you will cover recipes that target specific test scenarios and resolve them using best practices.By the end of the book you will be up and running with deploying Burp for securing web applications.What you will learnConfigure Burp Suite for your web applicationsPerform authentication authorization business logic and data validation testingExplore session management and client-side testingUnderstand unrestricted file uploads and server-side request forgeryExecute XML external entity attacks with BurpPerform remote code execution with BurpWho this book is forIf you are a security professional web pentester or software developer who wants to adopt Burp Suite for applications security this book is for you. About the Author Sunny Wear CISSP GWAPT GSSP-JAVA GSSP-.NET CSSLP CEH is an Information Security Architect Web App Penetration Tester and Developer. Her experience includes network data application and security architecture as well as programming across multiple languages and platforms. She has participated in the design and creation of many enterprise applications as well as the security testing aspects of platforms and services. She is the author of several security-related books which assists programmers in more easily finding mitigations to commonly-identified vulnerabilities within applications. She conducts security talks and classes at conferences like BSides Tampa AtlSecCon Hackfest CA and BSides Springfield.
Piracy-free
Assured Quality
Secure Transactions
*COD & Shipping Charges may apply on certain items.