Summary

As a quick summary, we have seen the different stages of an application pentest and we will now start looking at the different vulnerabilities and how we can use Burp to find those vulnerabilities. Along with this, we have also seen the different functions available in Burp and what configurations are made available to the user to easily use the proxy interception. 

In the next chapter we will be planning the approach to application penetration testing

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.147.67.166