Description: These days fire and forget is all the rage. Too many pentesters rely on automatic scanners to review their apps. This leaves little control to the actual tester and leads to heavy amounts of false negatives, and a healthy amount of false positives in appsec testing. Talk to any good appsec tester and they will tell you that "manual" testing is the ninja way to go. Well, here is a 20 min on how to use Burp Suite to both heighten and streamline your webapp hackery fu while retaining full control of the application test using Burp, the fuzzdb, and stealing from or replacing existing tools.
Tags: burp , appsec , webapp , hacking , proxy ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
Thanks,I was looking for this today and the slides were not available.
this is great. i was looking for a good video on burp.
Thanks a ton !! have been struggling to look for good videos on burp suite
If u have any videos on usage of intruder, repeater, sequencer and decoder, pls post them as well