• Practical scenario
  • Solution or strategy for the task
  • Follow along with the instructions briefly
  • Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line




    Download 6,34 Mb.
    Pdf ko'rish
    bet197/203
    Sana10.01.2024
    Hajmi6,34 Mb.
    #134102
    1   ...   193   194   195   196   197   198   199   200   ...   203
    Bog'liq
    Linux This Book Includes 4 Manuscripts The Underground Bible

    How does the burp suite work? 
    Burp suite uses a proxy mechanism to send requests as a middle man unlike
    acting as a client. This process will help the software to analyze every
    protocol it uses and every request it sends and the subsequent response it


    receives. By using this information burp suite can be used to send repeated
    or manipulated requests that can help the users to understand the process
    that is going on. 
    In this chapter, we will discuss in more of a practical way about the burp
    suite in detail. We will look at a scenario to understand the tool we are
    learning. 
    Practical scenario:
    We have a login page for our website www.amazonkali.com that uses https
    protocol. Our novice hackers' task is to log in to the website using the
    payloads that are present. Let us do it!
    Try to do this assignment by yourself for the first time while using the tool
    and if you are unable to get the task done follow the below section to
    understand the process that goes on. 
    Solution or strategy for the task: 
    First of all, after the successful installation of the burp suite, you need to
    enter the CA certificate in the browser options to make burp suite work on
    https websites. This is necessary to be done because https use an encrypted
    protocol that can be only read by the proxy interpretation tools when a CA
    certificate is installed. For the installation of the certificate, you need to
    start a proxy first. 
    Follow along with the instructions briefly:
    a) Open the burp suite proxy tab and enter the proxy 127.0.0.1 as an
    interception address. After entering the details, you need a select a browser
    preferably Mozilla Firefox because chrome spends a lot of computer usage
    and being a hacker coordination of processes is an important thing for
    smoother results. 
    b) In the Mozilla Firefox, proxy settings enter the same interception address
    and start the proxy server using the intercept on/off button. With this, every
    request or response will first go through the burp suite proxy server and will
    get recorded.


    With this, we have set up the burp suite with the browser and we are now all
    set to exploit the www.amazonkali.com website. Follow along for the
    procedure. 

    Download 6,34 Mb.
    1   ...   193   194   195   196   197   198   199   200   ...   203




    Download 6,34 Mb.
    Pdf ko'rish

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line

    Download 6,34 Mb.
    Pdf ko'rish