Book Image

Getting Started with Pentesting [Video]

By : Tajinder Kalsi
Book Image

Getting Started with Pentesting [Video]

By: Tajinder Kalsi

Overview of this book

<p><span id="description" class="sugar_field">With advanced hackers and threats always on the increase in our virtual world, proficiency with pentesting is an absolute necessity for individuals and organizations trying to protect their systems. </span></p> <p><span id="description" class="sugar_field">The methods and techniques contained in this video will provide you with a powerful arsenal of best practices to increase your penetration testing success. This course presents step-by-step instruction in information gathering and intelligence, and will allow you to gather the required information on the targets you are testing. The Exploitation and Post-Exploitation sections will supply you with the tools you need. The challenges at the end of each chapter are designed to test you and provide real-world situations to hone and perfect your penetration testing skills. </span></p> <h2><span class="sugar_field">Style and Approach</span></h2> <p><span class="sugar_field"><span id="trade_selling_points_c" class="sugar_field">Step-by-step instructions with challenges designed to test your skills and impart proficiency</span></span></p>
Table of Contents (5 chapters)
Chapter 3
Getting Organized with Essential Tools
Content Locked
Section 5
A Burpsuite Walkthrough – Basics
When pentesting web applications, the pentester would like to read through the HTTP packets being sent and received between the application and the web server. Burpsuite is the best available proxy tool to intercept and read these packets. - Confirm Burp’s proxy listener is active and working - Set up Buprsuite and the browser to work as proxy - Start intercepting and analyzing the traffic