Skip to Main Content
Hands-On Application Penetration Testing with Burp Suite
book

Hands-On Application Penetration Testing with Burp Suite

by Carlos A. Lozano, Dhruv Shah, Riyaz Ahemed Walikar
February 2019
Beginner to intermediate content levelBeginner to intermediate
366 pages
7h 49m
English
Packt Publishing
Content preview from Hands-On Application Penetration Testing with Burp Suite

Setting up proxy listeners

To use Burp as a tool for application penetration testing, it must be set as a Man in the Middle (MITM) proxy. An MITM proxy sits in between a client and a server, and allows the user to tamper or drop messages passing through. In its simplest form, Burp Suite is an MITM proxy for HTTP(S) traffic.

By default, Burp will listen on port 8080 on the localhost IP of 127.0.0.1. This can easily be changed, however, to an arbitrary free port on any IP address available on the system. To do this, follow these steps:

  1. Navigate to the Proxy | Options tab.
  2. Under Proxy Listeners, confirm that the Running checkbox is ticked in ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Burp Suite: Web Application Penetration Testing

Burp Suite: Web Application Penetration Testing

Sunil Gupta
Penetration Testing

Penetration Testing

James Hayes, Nick Furneaux, Jims Marchang, Rob Ellis, Jason Charalambous, Moinuddin Zaki, Peter Taylor, Roderick Douglas, Felix Ryan, Ceri Charlton, Gemma Moore, Tylor Robinson, Sharif Gardner
Penetration Testing

Penetration Testing

Georgia Weidman

Publisher Resources

ISBN: 9781788994064OtherErrata PagePurchase Link