Søk
Logg inn
  • Hjem

  • Kategorier

  • Lydbøker

  • E-bøker

  • For barn

  • Topplister

  • Hjelp

  • Last ned app

  • Bruk en kampanjekode

  • Løs inn gavekort

  • Prøv gratis nå
  • Logg inn
  • Språk

    • 🇳🇴 Norge
    • 🇧🇪 Belgique
    • 🇩🇰 Danmark
    • 🇩🇪 Deutschland
    • 🇪🇸 España
    • 🇫🇷 France
    • 🇳🇱 Nederland
    • 🇦🇹 Österreich
    • 🇨🇭 Schweiz
    • 🇫🇮 Suomi
    • 🇸🇪 Sverige
  1. Bøker
  2. Fakta
  3. Data og IT

Les og lytt gratis i 42 dager!

Si opp abonnementet når som helst

Prøv gratis nå
0.0(0)

Penetration Testing of Computer Networks Using Burpsuite and Various Penetration Testing Tools

Burp Suite is an integrated platform/graphical tool for performing security testing of web applications. Burp suite is a java application that can be used to secure or crack web applications. The suite consists of different tools, like a proxy server, a web spider an intruder and a so-called repeater, with which requests can be automated. You can use Burp's automated and manual tools to obtain detailed information about your target applications.

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is damn vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, help web developers better understand the processes of securing web applications and aid teachers/students to teach/learn web application security in a class room environment.

In this report I am using a combination of Burp tools to detect and exploit vulnerabilities in Damn Vulnerable Web App (DVWA) with low security. By default, Burp Scanner scans all requests and responses that pass through the proxy. Burp lists any issues that it identifies under Issue activity on the Dashboard. You can also use Burp Scanner to actively audit for vulnerabilities. Scanner sends additional requests and analyzes the application's traffic and behavior to identify issues.

Various examples are outlined in this report for different types of vulnerabilities such as: SQL injection, Cross Site Request Forgery (CSRF), Cross-site scripting, File upload, Local and Remote File Inclusion. I tested various types of penetration testing tools in order to exploit different types of vulnerabilities. The report consists from the following parts:

1. Installing and Configuring BurpSuite

2. BurpSuite Intruder.

3. Installing XMAPP and DVWA App in Windows System.

4. Installing PHP, MySQL, Apache2, Python and DVWA App in Kali Linux.

5. Scanning Kali-Linux and Windows Using .

6. Understanding Netcat, Reverse Shells and Bind Shells.

7. Adding Burps Certificate to Browser.

8. Setting up Target Scope in BurpSuite.

9. Scanning Using BurpSuite.

10. Scan results for SQL Injection Vulnerability with BurpSuite and Using SQLMAP to Exploit the SQL injection.

11. Scan Results for Operating System Command Injection Vulnerability with BurpSuite and Using Commix to Exploit the OS Command Injection.

12. Scan Results for Cross Side Scripting (XSS) Vulnerability with BurpSuite, Using Xserve to exploit XSS Injection and Stealing Web Login Session Cookies through the XSS Injection.

13. Exploiting File Upload Vulnerability.

14: Exploiting Cross Site Request Forgery (CSRF) Vulnerability.

15. Exploiting File Inclusion Vulnerability.

16. References.

E-bok

  • Utgitt: 11.3.2024

  • Språk: engelsk

  • Forlag: Dr. Hidaia Mahmood Alassouli

  • ISBN: 9783988654809


Forfatter:

  • Hidaia Mahmood Alassouli

Format:

  • E-bok

Varighet:

  • 124 sider

Språk:

engelsk

Kategorier:

  • Fakta
  • Data og IT

Mer av Hidaia Mahmood Alassouli

Hopp over listen
  1. Common Windows, Linux and Web Server Systems Hacking Techniques

    Hidaia Mahmood Alassouli

    book
  2. Wireless and Mobile Hacking and Sniffing Techniques

    Hidaia Mahmood Alassouli

    book
  3. Hacking of Computer Networks : Full Course on Hacking of Computer Networks

    Hidaia Mahmood Alassouli

    book
  4. علامات الساعة الصغرى والكبرى : The Minor and Major Signs of Judgment Day

    Hidaia Mahmood Alassouli

    book
  5. Introduction to Power System Protection

    Hidaia Mahmood Alassouli

    book
  6. Quick Guide for Creating, Selling and Buying Non-Fungible Tokens (NFTs)

    Hidaia Mahmood Alassouli

    book
  7. تعقيب الكاتبة على سلسله فيديوهات الدكتورة مايا صبحي حول الخيوط الخفيه للماسونية : Author's Comments on Dr. Maya Sobhi's Series of Videos about the Hidden Secrets of Freemasonry

    Hidaia Mahmood Alassouli

    book
  8. Review of the Specifications and Features of Different Smartphones Models

    Hidaia Mahmood Alassouli

    book
  9. Setup of a Graphical User Interface Desktop for Linux Virtual Machine on Cloud Platforms

    Hidaia Mahmood Alassouli

    book
  10. Methods to Overcome the Financial and Money Transfer Blockade against Palestine and any Country Suffering from Financial Blockade

    Hidaia Mahmood Alassouli

    book
  11. Evaluation of Some Android Emulators and Installation of Android OS on Virtualbox and VMware

    Hidaia Mahmood Alassouli

    book

Hjelp og kontakt


Om oss

  • Historien vår
  • Karriere
  • Presse
  • Tilgjengelighet
  • Bli partner
  • Investorkontakt
  • Instagram
  • Facebook

Utforsk

  • Kategorier
  • Lydbøker
  • E-bøker
  • Magasiner
  • For barn
  • Topplister

Populære kategorier

  • Krim
  • Biografier og essays
  • Romaner
  • Feelgood og romantikk
  • Personlig utvikling
  • Barnebøker
  • Sanne historier
  • Søvn og avslapning

Nextory

Copyright © 2025 Nextory AB

Personvernerklæring · Vilkår ·
Utmerket4.3 av 5