Companies Home Search Profile

Burp Suite Essential Training

Focused View

Malcolm Shore

1:24:48

76 View
  • 001. Learning how to use Burp Suite effectively.mp4
    00:44
  • 002. What you should know.mp4
    00:36
  • 003. Course disclaimer.mp4
    01:11
  • 004. What is Burp Suite.mp4
    02:16
  • 005. Getting to know Burp Suite.mp4
    08:03
  • 006. Proxying web traffic.mp4
    02:06
  • 007. Using Burp Suite as a proxy.mp4
    05:14
  • 008. Setting up additional targets.mp4
    04:16
  • 009. Crawling the website.mp4
    02:57
  • 010. Finding hidden webpages.mp4
    04:06
  • 011. Understanding message content.mp4
    07:55
  • 012. Finding missing content.mp4
    07:54
  • 013. Intercepting bank transactions.mp4
    01:55
  • 014. Exploiting headers.mp4
    04:51
  • 015. Inserting an SQL injection via Burp Suite.mp4
    06:50
  • 016. Saving request messages for further exploitation.mp4
    03:08
  • 017. Injecting commands into messages.mp4
    04:37
  • 018. Introducing the Intruder.mp4
    04:58
  • 019. Manipulating cookies.mp4
    04:05
  • 020. The four Intruders.mp4
    03:13
  • 021. Using CO2 to integrate SQLMap.mp4
    02:39
  • 022. Next steps.mp4
    01:14
  • Description


    Burp Suite, the popular web application penetration testing tool, has quickly become one of the preferred choices of security professionals around the world. In this course, instructor Malcolm Shore provides you with an in-depth look at how to use Burp Suite to meet all of your pen testing needs.

    Explore the basics of the Burp Suite user interface as well as how to proxy web traffic and set up additional targets. Learn about using Burp Suite as both a website crawler and a man in the middle proxy for message viewing, finding missing content, and modifying and manipulating commands. Find out how Burp Suite works as an attack tool when it's in intruder mode, and how to configure CO2 as an extension that integrates with SQLMap. Along the way, Malcolm offers tips on how to take your web application penetration testing skills to the next level and beyond.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Malcolm Shore
    Malcolm Shore
    Instructor's Courses
    Wide range of IT experience ranging from systems programming to policy and strategic planning. Strong expertise in applied IT security, focused on policy and governance. Teaching post graduate security (forensics, information warfare, security management, applied cryptography) Past interests include virtual worlds and web3d developments. Current work focusing on Cloud, security architectures, and national-level cybersecurity Specialties: SABSA, Cloud, Cryptography, Cybersecurity Strategy, Network Survivability
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 22
    • duration 1:24:48
    • Release Date 2023/01/03