- Web Penetration Testing with Kali Linux(Third Edition)
- Gilberto Najera Gutierrez Juned Ahmed Ansari
- 64字
- 2021-06-24 18:44:59
Customizing client interception
Specific rules can also be set if you want to narrow down the amount of web traffic that you intercept. As shown in the following screenshot, you can match requests for specific domains, HTTP methods, cookie names, and so on. Once the traffic is intercepted, you can then edit the values, forward them to the web server, and analyze the response:

推薦閱讀
- Windows Server 2019 Cookbook
- Modern Web Testing with TestCafe
- Social Media Mining with R
- Hands-On DevOps with Vagrant
- VMware Horizon View 6 Desktop Virtualization Cookbook
- Extending Puppet
- 開源安全運維平臺OSSIM疑難解析:入門篇
- 奔跑吧 Linux內核(入門篇)
- STM32庫開發實戰指南:基于STM32F4
- OpenStack系統架構設計實戰
- 深入淺出Node.js
- Linux命令行大全(第2版)
- 精解Windows 10
- Kali Linux高級滲透測試(原書第3版)
- Linux軟件管理平臺設計與實現