SPIKE and BURP for real world computer security usage (Part 4)

by Don Parker
Sept. 1, 2017 0 comments TechGenix Pen Testing & Audits windows server security

Over the course of the past several articles on HTTP proxies I have attempted to convey the sheer versatility that these tools bring to you as a computer security professional. They are perfectly suited, and really were designed for such things as protocol debugging, protocol bending, and application level attacks amongst a wide variety of other uses. Due to these wide array of usages, the HTTP proxy is a tool that you really should learn how to use.Not all HTTP proxies are the same though. Most of them have the same level of functionality, but have a different look and feel to them. You will also, at times, get differing results when using various HTTP proxies. Due to this it is always good to be comfortable in using a couple of them. One of the other HTTP proxies that I would definitely recommend is the BURP proxy suite. This HTTP proxy will be the focus of the article. As you will soon see, there is indeed a tremendous amount of functionality built into this tool. One caveat thou...

http://techgenix.com/spike-burp-real-world-computer-security-usage-part4