- Hands-On Application Penetration Testing with Burp Suite
- Carlos A. Lozano Dhruv Shah Riyaz Ahemed Walikar
- 183字
- 2021-07-02 12:16:31
Working with target exclusions
Just as we can add items to scope in Burp, we can also add items that need to be explicitly set out of scope. This, as is the case with in-scope items, can be added via two methods. The first is via the Proxy | History tab from the right-click context menu:

The second is from the Target scope tab in the Exclude from scope section. For example, if you want to exclude all sub-directories and files under /javascript, then the following options can be applied:
- Protocol: HTTP
- Host or IP range: mutillidae-testing.cxm
- Port: ^80$
- File: ^/javascript/.*

This will exclude all URLs under the /javascript/ directory on port 80 with the HTTP protocol.
You can also load a file containing a list of URLs that need to be excluded from scope via the Load button on the Target | Scope page. This list must be URLs/targets separated by newlines.
Both the Include in scope option and Exclude from scope option are case insensitive. /javascript/, /JavaScript/, and /jAvAscrIPt/ all mean the same for the Target | Scope feature of Burp.
- 信息安全導(dǎo)論(在線實驗+在線自測)
- Mobile Forensics Cookbook
- 白帽子講Web安全(紀(jì)念版)
- Mastering Kali Linux for Advanced Penetration Testing
- 反黑命令與攻防從新手到高手(微課超值版)
- 數(shù)據(jù)安全與隱私計算(第3版)
- 可信計算3.0工程初步(第二版)
- 無線傳感器網(wǎng)絡(luò)安全與加權(quán)復(fù)雜網(wǎng)絡(luò)抗毀性建模分析
- INSTANT Apple Configurator How-to
- 華為Anti-DDoS技術(shù)漫談
- Mastering Metasploit
- 信息內(nèi)容安全管理及應(yīng)用
- 網(wǎng)絡(luò)入侵檢測系統(tǒng)原理與應(yīng)用
- 安全網(wǎng)絡(luò)構(gòu)建
- INSTANT Microsoft Forefront UAG Mobile Configuration Starter