Web Application Hacking with Burp Suite you own this product

'); $(document.body).append('
loading reading lists ...
'); function adjustReadingListIcon(isInReadingList){ $readingListToggle.toggleClass("fa-plus", !isInReadingList); $readingListToggle.toggleClass("fa-check", isInReadingList); var tooltipMessage = isInReadingList ? "edit in reading lists" : "add to reading list"; $readingListToggle.attr("title", tooltipMessage); $readingListToggle.attr("data-original-title", tooltipMessage); } $.ajax({ url: "/readingList/isInReadingList", data: { productId: 3189 } }).done(function (data) { adjustReadingListIcon(data && data.hasProductInReadingList); }).catch(function(e){ console.log(e); adjustReadingListIcon(false); }); $readingListToggle.on("click", function(){ if(codePromise == null){ showToast() } loadCode().then(function(store){ store.requestReadingListSpecificationForProduct({ id: window.readingListsServerVars.externalId, manningId: window.readingListsServerVars.productId, title: window.readingListsServerVars.title }); ReadingLists.ReactDOM.render( ReadingLists.React.createElement(ReadingLists.ManningOnlineReadingListModal, { store: store, }), document.getElementById("reading-lists-modal") ); }).catch(function(e){ console.log("Error loading code reading list code"); }); }); var codePromise var readingListStore function loadCode(){ if(codePromise) { return codePromise } return codePromise = new Promise(function (resolve, reject){ $.getScript(window.readingListsServerVars.libraryLocation).done(function(){ hideToast() readingListStore = new ReadingLists.ReadingListStore( new ReadingLists.ReadingListProvider( new ReadingLists.ReadingListWebProvider( ReadingLists.SourceApp.marketplace, getDeploymentType() ) ) ); readingListStore.onReadingListChange(handleChange); readingListStore.onReadingListModalChange(handleChange); resolve(readingListStore); }).catch(function(){ hideToast(); console.log("Error downloading reading lists source"); $readingListToggle.css("display", "none"); reject(); }); }); } function handleChange(){ if(readingListStore != null) { adjustReadingListIcon(readingListStore.isInAtLeastOneReadingList({ id: window.readingListsServerVars.externalId, manningId: window.readingListsServerVars.productId })); } } var $readingListToast = $("#reading-list-toast"); function showToast(){ $readingListToast.css("display", "flex"); setTimeout(function(){ $readingListToast.addClass("shown"); }, 16); } function hideToast(){ $readingListToast.removeClass("shown"); setTimeout(function(){ $readingListToast.css("display", "none"); }, 150); } function getDeploymentType(){ switch(window.readingListsServerVars.deploymentType){ case "development": case "test": return ReadingLists.DeploymentType.dev; case "qa": return ReadingLists.DeploymentType.qa; case "production": return ReadingLists.DeploymentType.prod; case "docker": return ReadingLists.DeploymentType.docker; default: console.error("Unknown deployment environment, defaulting to production"); return ReadingLists.DeploymentType.prod; } } }); } });
Scott Cosentino
  • Course duration: 2h 10m

pro $24.99 per month

  • access to all Manning books, MEAPs, liveVideos, liveProjects, and audiobooks!
  • choose one free eBook per month to keep
  • exclusive 50% discount on all purchases

lite $19.99 per month

  • access to all Manning books, including MEAPs!

team

5, 10 or 20 seats+ for your team - learn more


Look inside

Burp Suite contains an array of tools for penetration testing and finding vulnerabilities, and is mainly used on web applications. This course will show you how to use the suite of tools to detect vulnerabilities that cause web applications to be compromised. This is a hands-on course that gets you using the tools on examples right away. Learn by doing!

The course starts with a demonstration of how to set up a project in Burp Suite and work with the various modules it includes. Then it shows you how to use it to identify information-disclosure vulnerabilities and expose sites leaking sensitive information. We cover insecure decentralization vulnerability and how to expose it; testing web sockets for vulnerabilities; and how to simulate the directory traversal attack and read files that are running. And we cap it off with a look at other types of attacks, including the external entity injection (XXE), cross-site scripting (XSS), and SQL injections.

When you finish this course, you will have all the skills you need to test web applications for vulnerabilities!


Distributed by Manning Publications

This course was created independently by Scott Cosentino and is distributed by Manning through our exclusive liveVideo platform.

prerequisites

  • Understanding of HTTP protocols and communications
  • Web application knowledge is required

about the instructor

Scott Cosentino is a developer and teacher who works primarily in software development and computer security. He is passionate about teaching and has inspired students in large classes, one-on-one, and online video courses. He believes mathematics and computer science can be approachable and fun, and tailors his courses to be easy to comprehend, with exploration of the what, why, and how of every topic. Because computer science and programming topics are not spectator sports, he provides many examples and practice problems for students to learn and practice.

what's a liveVideo?
Find out more

choose your plan

team

monthly
annual
$49.99
$399.99
only $33.33 per month
  • five seats for your team
  • access to all Manning books, MEAPs, liveVideos, liveProjects, and audiobooks!
  • choose another free product every time you renew
  • choose twelve free products per year
  • exclusive 50% discount on all purchases
  • Web Application Hacking with Burp Suite liveVideo for free
RECENTLY VIEWED