![]() Upcoming dates Locationĭelivered during Troopers 2017 security conference. RequirementsĪttendees should bring their own laptop with the latest Java as well as their favourite IDE installed. Attendees are expected to have rudimental understanding of Burp Suite as well as basic object-oriented programming experience (Burp extensions will be developed in Java). The training is suitable for both web application security specialists and developers. If you are curious, we’ve already uploaded the first three modules. This workshop is based on real-life use cases where the combination of custom checks and automation can help uncovering nasty security vulnerabilities.Īll templates and code-complete Burp Suite extensions will be available for free on Doyensec’s Github. Extension #4: Passive check for Burp’s scanning engineįinally, we leverage our extensions to build a security automation toolchain integrated in a CI environment (Jenkins).Extension #3: Active check for Burp’s scanning engine.Extension #2: A simple (and yet useful) replay tool. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |