- Hands-On Application Penetration Testing with Burp Suite
- Carlos A. Lozano Dhruv Shah Riyaz Ahemed Walikar
- 125字
- 2021-07-02 12:16:37
Why Burp Suite Scanner?
Now that we have established the basic understanding of how robust the Burp crawler is, it's time to understand why Burp Scanner is the go-to scanner for any pentest. Most traditional scanners usually fuzz the input fields, check the response, and determine if there is a vulnerability or not. But what if the application has certain rules, like, what if the application has enforced dynamic CSRF for every request? What if the application is a very dynamic application that serves different content for the same URL/page based on states, or what if the application invalidates the user on a malformed request? Worry not, because Burp already treats this differently and understands the underlying logic, enabling us with an optimized scan.
推薦閱讀
- API安全實戰
- 暗戰亮劍:黑客滲透與防御全程實錄
- Penetration Testing with Perl
- 黑客攻防與網絡安全從新手到高手(絕招篇)
- 可信計算3.0工程初步(第二版)
- 云原生安全技術實踐指南
- 軟件安全保障體系架構
- 數據安全領域指南
- Learning Pentesting for Android Devices
- 云計算安全防護技術
- 云計算安全技術與應用
- 計算機系統與網絡安全研究
- CPK通向賽博安全之路:理論與實踐CPK Solution to Cyber Security:Theory and Practice
- Hands-On Bug Hunting for Penetration Testers
- CCNA Security 210-260 Certification Guide