Video description
Expand your knowledge of Burp Suite beyond just capturing the request and responses. Burp Suite is a freely available and one of the most widely accepted penetration testing tools to discover vulnerabilities and attacks.
Burp Suite as an integrated platform has an advanced set of tools and interfaces to perform security testing. Its various tools work seamlessly together to support the entire security testing process, from initial mapping and analysis of an application’s attack surface to finding and exploiting security vulnerabilities. In this course, you will learn hands-on techniques for attacking web applications and web services using Burp Suite. Firstly, you will learn about scoping and mapping your target application properly. Next, you will spend some time analyzing the application attack surface and scanning to trigger potential security vulnerabilities in your target, then digging deep into the results to validate your findings. Finally, you will wrap up by learning how to properly customize and report your results to your audience.
By the end of this course, you will have a working knowledge of Burp Suite and be able to perform all these techniques at a comfortable and efficient level to better perform your job as a pentester.
Product information
- Title: Burp Suite: Web Application Penetration Testing
- Author(s):
- Release date: December 2020
- Publisher(s): EC-Council
- ISBN: None
You might also like
book
Hands-On Application Penetration Testing with Burp Suite
Test, fuzz, and break web applications and services using Burp Suite's powerful capabilities Key Features Master …
video
Web Application Hacking with Burp Suite
Burp Suite contains an array of penetration testing and vulnerability finder tools. It is mainly used …
book
Hands-On Web Penetration Testing with Metasploit
Identify, exploit, and test web application security with ease Key Features Get up to speed with …
video
Nmap for Penetration Testing: From Beginner to Advanced [Updated for 2021]
Network scanning and enumeration have become an increasingly important aspect of penetration tests over the last …