Book Image

Burp Suite Essentials

By : Akash Mahajan
Book Image

Burp Suite Essentials

By: Akash Mahajan

Overview of this book

Table of Contents (19 chapters)
Burp Suite Essentials
Credits
About the Author
Acknowledgments
About the Reviewers
www.PacktPub.com
Preface
Index

Summary


Now you know how to restrict the scope of HTTP traffic you would like to intercept. You saw how to include and exclude URL patterns for targets to configure, what in-scope is, and what out-of-scope is. Additionally, you learned how to configure Burp to be able to talk to other proxy servers if required and how to use the SOCKS proxy server, especially in a SSH tunnel kind of scenario.

You also learned how simple it is to create multiple listeners for Burp, which allows other devices in the network to send their HTTP traffic to the Burp interception proxy. The next chapter covers how to configure a proxy for SSL and other advanced settings that can be configured with Burp Suite.