17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
[FreeCoursesOnline.Me] [Packt] Burp Suite Recipes [FCO]
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
Adopt the functionality of Burpsuite to perform web application pen-testing
Video Details
ISBN 9781789536171
Course Length 2 hours 20 minutes
Table of Contents
• BURP SUITE TARGET AND PROXY MODULES
• SPIDERING AND SCANNING WEB APPLICATIONS
• DIGGING DEEPER INTO WEB APPLICATIONS USING INTRUDER
• REPEATER FOR YOUR RESCUE
• DELIGHTFUL DECODER
• SEQUENCER, COMPARER, AND EXTENDER
• BURP SUITE REPORTING
Video Description
Burp Suite is a Java-based platform for security-testing web applications. This tool has been widely adopted by professional enterprise testers.
This video offers practical recipes to tackle challenges in determining and exploring vulnerabilities in web applications. You will learn to uncover security flaws with various test cases for complex environments. After you have configured Burp for your environment, you will use various Burp tools such as Spider, Scanner, Intruder, Repeater, Decoder, and others to resolve specific problems faced by pentesters. You will learn to work with various modes Burp and then perform operations on the web using the Burp CLI. Towards the end of the course, you will come across recipes that target specific test scenarios and resolved them with best practices.
By the end of the course, you will be up-and-running with deploying Burp to secure web applications and will have gone from beginner to intermediate level in web penetration testing.
Style and Approach
This course aims to provide complete coverage of every Burp Suite objective. The course is filled with relevant, concise demonstrations and explanations to help you understand Burp Suite.
What You Will Learn
• Understand the working of Burpsuite with web applications.
• Learn Advance level techniques to enhance Burpsuite knowledge
• Perform Web Application Analysis using Burpsuite
• Understand and Perform Web Application Attacks using Burpsuite.
• Analyze the final results and generate the report using Burpsuite.
Authors
Sunil Gupta
Sunil Gupta is a Certified Ethical Hacker.
Currently, he teaches 50,000+ students online in 170+ countries. He is a specialist in Ethical Hacking.
Author strengths –
-Vulnerability
-Assessment
-Penetration Testing
-Bug Bounty Hunting
-Intrusion Detection
-Risk Identification
-Data Analysis
-Report and Briefing.
For More Udemy Free Courses >>> http://www.freetutorials.eu
For more Lynda and other Courses >>> https://www.freecoursesonline.me/
Our Forum for discussion >>> https://discuss.freetutorials.eu/
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
1 - Burp Suite Target and Proxy Modules/01_The Course Overview.mp4
12.8 MB
1 - Burp Suite Target and Proxy Modules/02_Proxy Module in Burp Suite.mp4
19.1 MB
1 - Burp Suite Target and Proxy Modules/03_Setup Proxy Settings.mp4
20.3 MB
1 - Burp Suite Target and Proxy Modules/04_Intercept Web Application Traffic Using Proxy Modules.mp4
18.3 MB
1 - Burp Suite Target and Proxy Modules/05_Target Module in Burp Suite.mp4
21.3 MB
1 - Burp Suite Target and Proxy Modules/06_Web Application Analysis Using Target Module.mp4
24.4 MB
2 - Spidering and Scanning Web Applications/01_Spidering Module in Burp Suite.mp4
16.4 MB
2 - Spidering and Scanning Web Applications/02_Web Application Spidering Using Spidering Module.mp4
18.5 MB
2 - Spidering and Scanning Web Applications/03_Scanner Module in Burp Suite.mp4
14.4 MB
2 - Spidering and Scanning Web Applications/04_Community Burp Suite versus Professional Burp Suite.mp4
14.5 MB
2 - Spidering and Scanning Web Applications/05_Web Application Scanning Using Scanner Module.mp4
13.5 MB
3 - Digging Deeper into Web Applications Using Intruder/01_Intruder Module in Burp Suite.mp4
26 MB
3 - Digging Deeper into Web Applications Using Intruder/02_Brute-Force Attack Overview.mp4
10.8 MB
3 - Digging Deeper into Web Applications Using Intruder/03_Send Web Application Traffic to Intruder.mp4
16.6 MB
3 - Digging Deeper into Web Applications Using Intruder/04_Perform a Web Application Brute-Force Attack.mp4
60.3 MB
3 - Digging Deeper into Web Applications Using Intruder/05_Intruder Summary.mp4
9 MB
4 - Repeater for Your Rescue/01_Repeater Module in Burp Suite.mp4
20.7 MB
4 - Repeater for Your Rescue/02_Request and Response in Repeater.mp4
13.1 MB
4 - Repeater for Your Rescue/03_Save Web Application Analysis Time Using Repeater.mp4
26.9 MB
4 - Repeater for Your Rescue/04_Repeater Summary.mp4
7.9 MB
5 - Delightful Decoder/01_Decoder Module in Burp Suite.mp4
15.2 MB
5 - Delightful Decoder/02_Loading Web Application Data into the Decoder.mp4
18.9 MB
5 - Delightful Decoder/03_Smart Encoding and Decoding Using Decoder.mp4
12 MB
5 - Delightful Decoder/04_Decoder Summary.mp4
5 MB
6 - Sequencer, Comparer, and Extender/01_About Sequencer, Comparer, and Extender Modules.mp4
16.8 MB
6 - Sequencer, Comparer, and Extender/02_Analyze Randomness in Web Application Data Using Sequencer.mp4
19.2 MB
6 - Sequencer, Comparer, and Extender/03_Compare Two Different Web Application Data Using Comparer.mp4
24.9 MB
6 - Sequencer, Comparer, and Extender/04_Use Burp Extensions Using Extender.mp4
16.2 MB
7 - Burp Suite Reporting/01_Setting Severities in Burp Suite.mp4
10.4 MB
7 - Burp Suite Reporting/02_Generate Web Application Analysis Report.mp4
10.6 MB
7 - Burp Suite Reporting/03_Explanation of Web Application Analysis Report.mp4