In this chapter, we are going to pentest various vulnerable applications via Burp to better understand how we can pentest efficiently with Burp Suite.
The following topics will be covered in this chapter:
- Setup of vulnerable web applications
- Reconnaissance and file discovery
- Testing authentication schema with Burp