Crawl and Scan with Burp Suite
Offered By: Pluralsight
Course Description
Overview
Automated scans are an essential tool for web application pentests since they help you quickly identify common issues. This course will teach you automated vulnerability scanning with the Burp suite.
During a web application penetration test, your job is to identify potential vulnerabilities that attackers could exploit. Automated scans can help you quickly identify the most common web vulnerabilities, including SQL Injections and cross-site scripting. In this course, Crawl and Scan with Burp Suite, you’ll learn to map websites and identify vulnerabilities using the Burp tool. First, you’ll explore how to crawl a website to map its content. Next, you’ll discover how to run automated scans to identify common vulnerabilities. Finally, you’ll learn to generate reports based on the scan findings. When you’re finished with this course, you’ll have the skills and knowledge of Burp Suite needed to crawl and scan a web application.
During a web application penetration test, your job is to identify potential vulnerabilities that attackers could exploit. Automated scans can help you quickly identify the most common web vulnerabilities, including SQL Injections and cross-site scripting. In this course, Crawl and Scan with Burp Suite, you’ll learn to map websites and identify vulnerabilities using the Burp tool. First, you’ll explore how to crawl a website to map its content. Next, you’ll discover how to run automated scans to identify common vulnerabilities. Finally, you’ll learn to generate reports based on the scan findings. When you’re finished with this course, you’ll have the skills and knowledge of Burp Suite needed to crawl and scan a web application.
Syllabus
- Course Overview (trailer) 1min
- Crawling Web Targets 21mins
- Scanning with Burp Suite 18mins
- Reporting Findings 16mins
Taught by
Ricardo Reimao
Related Courses
Network SecurityGeorgia Institute of Technology via Udacity Proactive Computer Security
University of Colorado System via Coursera Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera Hacker101
HackerOne via Independent CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent