Book Content
chapters • 12h12m total length
1. Configuring Burp Suite
2. Configuring the Client and Setting Up Mobile Devices
3. Executing an Application Penetration Test
4. Exploring the Stages of an Application Penetration Test
5. Preparing for an Application Penetration Test
6. Identifying Vulnerabilities Using Burp Suite
7. Detecting Vulnerabilities Using Burp Suite
8. Exploiting Vulnerabilities Using Burp Suite - Part 1
9. Exploitation of Vulnerabilities using Burp Suite - Part 2
10. Writing Burp Suite Extensions
11. Breaking the authentication for a large online retailer
12. Exploiting and exfiltrating data from a large shipping corporation














