Burp Suite Pro is the leading tool for auditing Web applications at large. Users are mainly penetration testers, QA people, or advanced developers. Mastering Burp Suite allows users to get the most out of the tool, optimizing time spent. Work will be faster, more effective and more efficient. What's more, advanced techniques allow detection of additional vulnerabilities whether complex or subtle.
Possible targets are classic web applications, of course, but also thin clients, mobile applications, internal networks or complex cloud deployments.
The following roles are expected:
Whatever your role, this training will provide beneficial automation skills whether novice or expert:
The training is based on 40+ micro-challenges replicating real-life scenarios:
Attendees will also learn to measure the quality of their attacks, a crucial skill in real-life engagements. Finally, alternative strategies and techniques will be demonstrated, giving a wider view of available functionalities.
Introduction to Burp
Advanced Proxy module
Advanced Intruder module
Authentication and authorization module
Macros and sessions module
Laptop with Wifi connectivity
OS supported by Burp Suite (Mac, Windows, Linux)
Recent JRE (Oracle >= 1.8)
Enough RAM (4 Go)
Latest version of Burp Suite Pro (provided if needed)
Modern browser (Chrome, Firefox, ...)
Text editor (ideally with syntax coloring for Python)
2016: Hack In The Box GSEC (Singapore)
2015: Hackfest (CA), HackInParis (FR)
2014: HackInParis (FR), Insomni'hack (CH)
2013: AppSec Security Forum (CH)
3 days of hands-on practice!
Less than 10 students per session
Copy of the 40+ challenges
Slidedeck (~350 pages) in paper and PDF
A temporary Pro license
Some Burp Suite goodies
Coffee, tea and other drinks during the day
Travel, accomodation and dinners (but assistance can be provided)
A Web penetration testing methodology: the goal is to master the toolbox
Nicolas Gregoire has more than 15 years of experience in penetration testing and auditing of networks and (mostly Web) applications. A few years ago, he founded Agarri, a small company where he seeks security bugs for customers and for fun. His research has been presented at numerous conferences around the world and he has been publicly thanked by numerous vendors for responsibly disclosing vulnerabilities in their products. He occasionally participates in bug bounties, and earned the highest rewards from Prezi (twice) and Yahoo. He's also a long-time user of Burp Suite (playing with this tool for the last 8 years) and an official PortSwigger training partner.
This training is mostly given privately to security companies, large vendors and internal security teams. Most of these customers do not wish to be named. However, this training (or some shorter versions) were also presented at public events like "Hackfest" (Canada), "Application Security Forum" (Switzerland) and "Hack In Paris" (France). The overall feedback is largely positive, with a satisfaction rate approaching 100%.