- Hands-On Bug Hunting for Penetration Testers
- Joseph Marshall
- 121字
- 2021-07-16 17:53:08
Using Burp
Now let's start Burp – the 4G part of the command is where we're specifying Burp Suite should run on 4 GB memory:
java -jar -Xmx4G "/Applications/Burp Suite Community Edition.app/Contents/java/app/burp/burpsuite_community_1.7.33-9.jar"
Since this is a mouthful, we can create a small wrapper script that will use the $@ variable to add any options we may want to pass, without making us rewrite our path to the .jar executable. Here's bootstrap_burp.sh:
#!/bin/sh
java -jar -Xmx3G "/Applications/Burp Suite Community Edition.app/Contents/java/app/burp/burpsuite_community_1.7.33-9.jar" $@
Now you can make the file executable and symlink it to /usr/local/bin or the appropriate utility so it's available in your $PATH:
chmod u+x bootstrap_burp.sh
sudo ln -s /Full/path/to/bootstrap_burp.sh /usr/local/bin/bootstrap_burp
This allows us to start the program with just bootstrap_burp.
推薦閱讀
- 網絡安全與管理
- 黑客大曝光:無線網絡安全(原書第3版)
- Metasploit Penetration Testing Cookbook(Third Edition)
- 腦洞大開:滲透測試另類實戰攻略
- 網絡空間攻防技術原理
- Metasploit Penetration Testing Cookbook(Second Edition)
- 走進新安全:讀懂網絡安全威脅、技術與新思想
- INSTANT Windows PowerShell
- 反黑命令與攻防從新手到高手(微課超值版)
- 數據安全實踐指南
- Learning Veeam? Backup & Replication for VMware vSphere
- ARM匯編與逆向工程:藍狐卷·基礎知識
- 解密彩虹團隊非凡實戰能力:企業安全體系建設(共5冊)
- 云原生安全技術實踐指南
- 互聯網企業安全高級指南