- Web Penetration Testing with Kali Linux(Third Edition)
- Gilberto Najera Gutierrez Juned Ahmed Ansari
- 64字
- 2021-06-24 18:44:59
Customizing client interception
Specific rules can also be set if you want to narrow down the amount of web traffic that you intercept. As shown in the following screenshot, you can match requests for specific domains, HTTP methods, cookie names, and so on. Once the traffic is intercepted, you can then edit the values, forward them to the web server, and analyze the response:

推薦閱讀
- Linux運維之道(第3版)
- Linux實戰
- UNIX操作系統設計
- Windows Server 2012網絡操作系統企業應用案例詳解
- STM32庫開發實戰指南:基于STM32F4
- Joomla! 3 Template Essentials
- Application Development in iOS 7
- 大規模分布式系統架構與設計實戰
- Web Penetration Testing with Kali Linux(Third Edition)
- bash shell腳本編程經典實例(第2版)
- 嵌入式微系統
- Raspberry Pi入門指南
- Linux從入門到精通(視頻教學版)
- Linux內核修煉之道
- Microsoft Hyper-V Cluster Design