- Web Penetration Testing with Kali Linux(Third Edition)
- Gilberto Najera Gutierrez Juned Ahmed Ansari
- 63字
- 2021-06-24 18:44:59
Modifying requests on the fly
In the Match and Replace section, you can configure rules that will look for specific values in the request and edit it on the fly without requiring any manual intervention. Burp Proxy includes several of these rules. The most notable ones are used to replace the user agent value with that of Internet Explorer, iOS, or Android devices:

推薦閱讀
- 零起點學Linux系統管理
- Windows Phone 7.5 Data Cookbook
- 深入理解eBPF與可觀測性
- 無蘋果不生活 The New iPad隨身寶典
- Kali Linux高級滲透測試
- 精解Windows 10
- Windows 7實戰從入門到精通(超值版)
- Advanced Infrastructure Penetration Testing
- Linux網絡操作系統項目教程(RHEL 7.4/CentOS 7.4)(第3版)(微課版)
- 大學計算機應用基礎實踐教程(Windows 7+MS Office 2010)
- 再也不踩坑的kubernetes實戰指南
- openEuler操作系統核心技術與行業應用實踐
- Learning Joomla! 3 Extension Development(Third Edition)
- Gradle Effective Implementations Guide(Second Edition)
- OpenSolaris系統管理