Summary
In this chapter, we learned to prepare the Burp Suite application. We configured Burp Suite to make it the interception proxy for various clients and traffic sources. In the next chapter, we will learn how to configure the client and set up mobile devices.
推薦閱讀
- RESTful Java Web Services Security
- 科技安全:戰略實踐與展望
- 黑客攻防入門秘笈
- .NET安全攻防指南(上冊)
- 從0到1:CTFer成長之路
- Falco云原生安全:Falco原理、實踐與擴展
- 從實踐中學習Kali Linux滲透測試
- 可信計算3.0工程初步(第二版)
- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- End to End GUI Development with Qt5
- 編譯與反編譯技術實戰
- 網絡安全態勢感知
- 電腦安全與攻防入門很輕松(實戰超值版)
- 隱私計算:推進數據“可用不可見”的關鍵技術
- Cybersecurity Threats,Malware Trends,and Strategies