Preparing for an Application Penetration Test

In this chapter, we are going to pentest various vulnerable applications via Burp to better understand how we can pentest efficiently with Burp Suite.

The following topics will be covered in this chapter:

  • Setup of vulnerable web applications
  • Reconnaissance and file discovery
  • Testing authentication schema with Burp
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset