SlideShare a Scribd company logo
@owaspistanbul - rumeysabozdemir@gmail.com
RUMEYSA BOZDEMİR
• Computer Programming - Associate Degree
• Management Information System - Bachelor’s Degree
• ITIL 4 Foundation Certificate in IT Service Management
• ISO27001 LA - CQI|IRCA
• C|EH - EC - Council
• IT Expertise – BEM
• Cyber Security Specialist – TUBITAK
• OWASP Chapter Leaders - Istanbul
@owaspistanbul - rumeysabozdemir@gmail.com
OWASP
• Kar amacı gütmeyen ve yazılım güvenliğini artırmak için çalışan bir
kuruluştur.
• Yaklaşık 20 yıldır hizmet vermektedir.
• Açık kaynak yazılım projeleri
• Yüzlerce yerel bölüm
• On binlerce üye
• Eğitim / Konferans
@owaspistanbul - rumeysabozdemir@gmail.com
OWASP
@owaspistanbul
@rumeysabzdmr
@owaspistanbul - rumeysabozdemir@gmail.com
@owaspistanbul
OWASP INFO
@owaspistanbul - rumeysabozdemir@gmail.com
• Burp Suite Nedir?
• Burp Suite Nasıl Kullanılır?
• Burp Suite ile Brufe Force Saldırısı Nasıl Yapılır?
OWASP | BURP SUİTE NEDİR?
@owaspistanbul - rumeysabozdemir@gmail.com
• JAVA dilinde yazılmıştır.
• Web Proxy uygulamasıdır.
• Web uygulama testlerinde kullanılır.
OWASP | BURP SUİTE NASIL KULLANILIR?
@owaspistanbul - rumeysabozdemir@gmail.com
https://portswigger.net/
OWASP | BURP SUİTE NASIL KULLANILIR?
@owaspistanbul - rumeysabozdemir@gmail.com
• Uygulama için ihtiyacımız olanlar;
• Metasploitable 2
• https://sourceforge.net/projects/metasploitable/files/latest/download
• Burp Suite Community Edition
• https://portswigger.net/burp/communitydownload
• Kali Linux
• https://www.offensive-security.com/kali-linux-vm-vmware-virtualbox-image-download/
OWASP | BURP SUİTE NASIL KULLANILIR?
@owaspistanbul - rumeysabozdemir@gmail.com
Kullanıcı Adı/Parola: msfadmin:msfadmin
OWASP | BURP SUİTE NASIL KULLANILIR?
@owaspistanbul - rumeysabozdemir@gmail.com
Metasploitable 2 makinasını tarayıcı ile ziyaret et.
OWASP | BRUFE FORCE SALDIRISI
@owaspistanbul - rumeysabozdemir@gmail.com
Hedef Web Uygulaması
OWASP | BRUFE FORCE SALDIRISI
@owaspistanbul - rumeysabozdemir@gmail.com
OWASP | PROXY AYARI
@owaspistanbul - rumeysabozdemir@gmail.com
OWASP | PROXY AYARI
@owaspistanbul - rumeysabozdemir@gmail.com
OWASP | PROXY AYARI
@owaspistanbul - rumeysabozdemir@gmail.com
OWASP | BRUFE FORCE SALDIRISI
@owaspistanbul - rumeysabozdemir@gmail.com
OWASP | BRUFE FORCE SALDIRISI
@owaspistanbul - rumeysabozdemir@gmail.com
OWASP | BRUFE FORCE SALDIRISI
@owaspistanbul - rumeysabozdemir@gmail.com
OWASP | BRUFE FORCE SALDIRISI
@owaspistanbul - rumeysabozdemir@gmail.com
OWASP | BRUFE FORCE SALDIRISI
@owaspistanbul - rumeysabozdemir@gmail.com
OWASP | BRUFE FORCE SALDIRISI
@owaspistanbul - rumeysabozdemir@gmail.com
OWASP | BRUFE FORCE SALDIRISI
@owaspistanbul - rumeysabozdemir@gmail.com
OWASP | BRUFE FORCE SALDIRISI
@owaspistanbul - rumeysabozdemir@gmail.com
OWASP | BRUFE FORCE SALDIRISI
@owaspistanbul - rumeysabozdemir@gmail.com
OWASP | BRUFE FORCE SALDIRISI
@owaspistanbul - rumeysabozdemir@gmail.com
OWASP
@owaspistanbul
@rumeysabzdmr
@owaspistanbul - rumeysabozdemir@gmail.com
@owaspistanbul
OWASP
@owaspistanbul - rumeysabozdemir@gmail.com
KAYNAKLAR
@owaspistanbul - rumeysabozdemir@gmail.com
• https://docs.rapid7.com/metasploit/metasploitable-2/
• https://sourceforge.net/projects/metasploitable/files/latest/downloa
d
• https://portswigger.net/burp/communitydownload
• https://www.offensive-security.com/kali-linux-vm-vmware-virtualbox-
image-download/
• https://addons.mozilla.org/en-US/firefox/addon/foxyproxy-standard/
• https://portswigger.net/support/using-burp-to-brute-force-a-login-
page

More Related Content

Similar to Burp Suite İle Brute Force Attack | OWASP Istanbul

Stratos Open PaaS OSCON 2011
Stratos Open PaaS OSCON 2011Stratos Open PaaS OSCON 2011
Stratos Open PaaS OSCON 2011
Paul Fremantle
 
MySQL 简要介绍
MySQL 简要介绍MySQL 简要介绍
MySQL 简要介绍
YUCHENG HU
 
OISC 2019 - The OWASP Top 10 & AppSec Primer
OISC 2019 - The OWASP Top 10 & AppSec PrimerOISC 2019 - The OWASP Top 10 & AppSec Primer
OISC 2019 - The OWASP Top 10 & AppSec Primer
ThreatReel Podcast
 
Building Cloud Native Software
Building Cloud Native SoftwareBuilding Cloud Native Software
Building Cloud Native Software
Paul Fremantle
 
AWS Webcast - AWS OpsWorks Continuous Integration Demo
AWS Webcast - AWS OpsWorks Continuous Integration Demo  AWS Webcast - AWS OpsWorks Continuous Integration Demo
AWS Webcast - AWS OpsWorks Continuous Integration Demo
Amazon Web Services
 
Network Functions Virtualization and CloudStack
Network Functions Virtualization and CloudStackNetwork Functions Virtualization and CloudStack
Network Functions Virtualization and CloudStack
Chiradeep Vittal
 
Pabug Presentation Final
Pabug Presentation   FinalPabug Presentation   Final
Pabug Presentation FinalMelissa Miller
 
Advanced use cases and approaches with stratos paa s
Advanced use cases and approaches with stratos paa sAdvanced use cases and approaches with stratos paa s
Advanced use cases and approaches with stratos paa sWSO2
 
Sas 2015 event_driven
Sas 2015 event_drivenSas 2015 event_driven
Sas 2015 event_driven
Sascha Möllering
 
The Future of SDN in CloudStack by Chiradeep Vittal
The Future of SDN in CloudStack by Chiradeep VittalThe Future of SDN in CloudStack by Chiradeep Vittal
The Future of SDN in CloudStack by Chiradeep Vittal
buildacloud
 
Directions for CloudStack Networking
Directions for CloudStack  NetworkingDirections for CloudStack  Networking
Directions for CloudStack Networking
Chiradeep Vittal
 
ZAP @FOSSASIA2015
ZAP @FOSSASIA2015ZAP @FOSSASIA2015
ZAP @FOSSASIA2015
Sumanth Damarla
 
OWASP Top 10 Proactive Controls 2016 - PHP Québec August 2017
OWASP Top 10 Proactive Controls 2016 - PHP Québec August 2017OWASP Top 10 Proactive Controls 2016 - PHP Québec August 2017
OWASP Top 10 Proactive Controls 2016 - PHP Québec August 2017
Philippe Gamache
 
OWASP Top 10 Proactive Controls 2016 - NorthEast PHP 2017
OWASP Top 10 Proactive Controls 2016 - NorthEast PHP 2017 OWASP Top 10 Proactive Controls 2016 - NorthEast PHP 2017
OWASP Top 10 Proactive Controls 2016 - NorthEast PHP 2017
Philippe Gamache
 
Azure Web PubSub Serviceを触ってみた
Azure Web PubSub Serviceを触ってみたAzure Web PubSub Serviceを触ってみた
Azure Web PubSub Serviceを触ってみた
DevTakas
 
Into the Box 2018 Building a PWA
Into the Box 2018 Building a PWA Into the Box 2018 Building a PWA
Into the Box 2018 Building a PWA
Ortus Solutions, Corp
 
Word press
Word pressWord press
Word press
Amir Shokri
 
Standardizing and Managing Your Infrastructure - MOSC 2011
Standardizing and Managing Your Infrastructure - MOSC 2011Standardizing and Managing Your Infrastructure - MOSC 2011
Standardizing and Managing Your Infrastructure - MOSC 2011
Brian Ritchie
 
Warsaw MuleSoft Meetup - Runtime Fabric
Warsaw MuleSoft Meetup - Runtime FabricWarsaw MuleSoft Meetup - Runtime Fabric
Warsaw MuleSoft Meetup - Runtime Fabric
Patryk Bandurski
 
Infrastructure as Data with Ansible for easier Continuous Delivery
Infrastructure as Data with Ansible for easier Continuous DeliveryInfrastructure as Data with Ansible for easier Continuous Delivery
Infrastructure as Data with Ansible for easier Continuous Delivery
Carlo Bonamico
 

Similar to Burp Suite İle Brute Force Attack | OWASP Istanbul (20)

Stratos Open PaaS OSCON 2011
Stratos Open PaaS OSCON 2011Stratos Open PaaS OSCON 2011
Stratos Open PaaS OSCON 2011
 
MySQL 简要介绍
MySQL 简要介绍MySQL 简要介绍
MySQL 简要介绍
 
OISC 2019 - The OWASP Top 10 & AppSec Primer
OISC 2019 - The OWASP Top 10 & AppSec PrimerOISC 2019 - The OWASP Top 10 & AppSec Primer
OISC 2019 - The OWASP Top 10 & AppSec Primer
 
Building Cloud Native Software
Building Cloud Native SoftwareBuilding Cloud Native Software
Building Cloud Native Software
 
AWS Webcast - AWS OpsWorks Continuous Integration Demo
AWS Webcast - AWS OpsWorks Continuous Integration Demo  AWS Webcast - AWS OpsWorks Continuous Integration Demo
AWS Webcast - AWS OpsWorks Continuous Integration Demo
 
Network Functions Virtualization and CloudStack
Network Functions Virtualization and CloudStackNetwork Functions Virtualization and CloudStack
Network Functions Virtualization and CloudStack
 
Pabug Presentation Final
Pabug Presentation   FinalPabug Presentation   Final
Pabug Presentation Final
 
Advanced use cases and approaches with stratos paa s
Advanced use cases and approaches with stratos paa sAdvanced use cases and approaches with stratos paa s
Advanced use cases and approaches with stratos paa s
 
Sas 2015 event_driven
Sas 2015 event_drivenSas 2015 event_driven
Sas 2015 event_driven
 
The Future of SDN in CloudStack by Chiradeep Vittal
The Future of SDN in CloudStack by Chiradeep VittalThe Future of SDN in CloudStack by Chiradeep Vittal
The Future of SDN in CloudStack by Chiradeep Vittal
 
Directions for CloudStack Networking
Directions for CloudStack  NetworkingDirections for CloudStack  Networking
Directions for CloudStack Networking
 
ZAP @FOSSASIA2015
ZAP @FOSSASIA2015ZAP @FOSSASIA2015
ZAP @FOSSASIA2015
 
OWASP Top 10 Proactive Controls 2016 - PHP Québec August 2017
OWASP Top 10 Proactive Controls 2016 - PHP Québec August 2017OWASP Top 10 Proactive Controls 2016 - PHP Québec August 2017
OWASP Top 10 Proactive Controls 2016 - PHP Québec August 2017
 
OWASP Top 10 Proactive Controls 2016 - NorthEast PHP 2017
OWASP Top 10 Proactive Controls 2016 - NorthEast PHP 2017 OWASP Top 10 Proactive Controls 2016 - NorthEast PHP 2017
OWASP Top 10 Proactive Controls 2016 - NorthEast PHP 2017
 
Azure Web PubSub Serviceを触ってみた
Azure Web PubSub Serviceを触ってみたAzure Web PubSub Serviceを触ってみた
Azure Web PubSub Serviceを触ってみた
 
Into the Box 2018 Building a PWA
Into the Box 2018 Building a PWA Into the Box 2018 Building a PWA
Into the Box 2018 Building a PWA
 
Word press
Word pressWord press
Word press
 
Standardizing and Managing Your Infrastructure - MOSC 2011
Standardizing and Managing Your Infrastructure - MOSC 2011Standardizing and Managing Your Infrastructure - MOSC 2011
Standardizing and Managing Your Infrastructure - MOSC 2011
 
Warsaw MuleSoft Meetup - Runtime Fabric
Warsaw MuleSoft Meetup - Runtime FabricWarsaw MuleSoft Meetup - Runtime Fabric
Warsaw MuleSoft Meetup - Runtime Fabric
 
Infrastructure as Data with Ansible for easier Continuous Delivery
Infrastructure as Data with Ansible for easier Continuous DeliveryInfrastructure as Data with Ansible for easier Continuous Delivery
Infrastructure as Data with Ansible for easier Continuous Delivery
 

More from Rumeysa Bozdemir

Network Penetration Testing | OWASP Istanbul
Network Penetration Testing | OWASP Istanbul Network Penetration Testing | OWASP Istanbul
Network Penetration Testing | OWASP Istanbul
Rumeysa Bozdemir
 
Burp Suite SQL Injection Attack | OWASP Istanbul
Burp Suite SQL Injection Attack | OWASP Istanbul Burp Suite SQL Injection Attack | OWASP Istanbul
Burp Suite SQL Injection Attack | OWASP Istanbul
Rumeysa Bozdemir
 
Burp Suite İle File Upload Attack | OWASP Istanbul
Burp Suite İle File Upload Attack | OWASP Istanbul Burp Suite İle File Upload Attack | OWASP Istanbul
Burp Suite İle File Upload Attack | OWASP Istanbul
Rumeysa Bozdemir
 
OWASP - Siber Güvenlik Sektöründe Kariyer Yapmak
OWASP - Siber Güvenlik Sektöründe Kariyer YapmakOWASP - Siber Güvenlik Sektöründe Kariyer Yapmak
OWASP - Siber Güvenlik Sektöründe Kariyer Yapmak
Rumeysa Bozdemir
 
Web App Hacking | OWASP Istanbul
Web App Hacking | OWASP IstanbulWeb App Hacking | OWASP Istanbul
Web App Hacking | OWASP Istanbul
Rumeysa Bozdemir
 
Information Gathering | OWASP Istanbul
Information Gathering | OWASP IstanbulInformation Gathering | OWASP Istanbul
Information Gathering | OWASP Istanbul
Rumeysa Bozdemir
 
Kritik Altyyapıları Asgari Güvenlik Önlemleri
Kritik Altyyapıları Asgari Güvenlik ÖnlemleriKritik Altyyapıları Asgari Güvenlik Önlemleri
Kritik Altyyapıları Asgari Güvenlik Önlemleri
Rumeysa Bozdemir
 
Kritik Altyapıların Güvenliği
Kritik Altyapıların GüvenliğiKritik Altyapıların Güvenliği
Kritik Altyapıların Güvenliği
Rumeysa Bozdemir
 

More from Rumeysa Bozdemir (8)

Network Penetration Testing | OWASP Istanbul
Network Penetration Testing | OWASP Istanbul Network Penetration Testing | OWASP Istanbul
Network Penetration Testing | OWASP Istanbul
 
Burp Suite SQL Injection Attack | OWASP Istanbul
Burp Suite SQL Injection Attack | OWASP Istanbul Burp Suite SQL Injection Attack | OWASP Istanbul
Burp Suite SQL Injection Attack | OWASP Istanbul
 
Burp Suite İle File Upload Attack | OWASP Istanbul
Burp Suite İle File Upload Attack | OWASP Istanbul Burp Suite İle File Upload Attack | OWASP Istanbul
Burp Suite İle File Upload Attack | OWASP Istanbul
 
OWASP - Siber Güvenlik Sektöründe Kariyer Yapmak
OWASP - Siber Güvenlik Sektöründe Kariyer YapmakOWASP - Siber Güvenlik Sektöründe Kariyer Yapmak
OWASP - Siber Güvenlik Sektöründe Kariyer Yapmak
 
Web App Hacking | OWASP Istanbul
Web App Hacking | OWASP IstanbulWeb App Hacking | OWASP Istanbul
Web App Hacking | OWASP Istanbul
 
Information Gathering | OWASP Istanbul
Information Gathering | OWASP IstanbulInformation Gathering | OWASP Istanbul
Information Gathering | OWASP Istanbul
 
Kritik Altyyapıları Asgari Güvenlik Önlemleri
Kritik Altyyapıları Asgari Güvenlik ÖnlemleriKritik Altyyapıları Asgari Güvenlik Önlemleri
Kritik Altyyapıları Asgari Güvenlik Önlemleri
 
Kritik Altyapıların Güvenliği
Kritik Altyapıların GüvenliğiKritik Altyapıların Güvenliği
Kritik Altyapıların Güvenliği
 

Recently uploaded

RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 

Recently uploaded (20)

RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 

Burp Suite İle Brute Force Attack | OWASP Istanbul

  • 2. RUMEYSA BOZDEMİR • Computer Programming - Associate Degree • Management Information System - Bachelor’s Degree • ITIL 4 Foundation Certificate in IT Service Management • ISO27001 LA - CQI|IRCA • C|EH - EC - Council • IT Expertise – BEM • Cyber Security Specialist – TUBITAK • OWASP Chapter Leaders - Istanbul @owaspistanbul - rumeysabozdemir@gmail.com
  • 3. OWASP • Kar amacı gütmeyen ve yazılım güvenliğini artırmak için çalışan bir kuruluştur. • Yaklaşık 20 yıldır hizmet vermektedir. • Açık kaynak yazılım projeleri • Yüzlerce yerel bölüm • On binlerce üye • Eğitim / Konferans @owaspistanbul - rumeysabozdemir@gmail.com
  • 5. OWASP INFO @owaspistanbul - rumeysabozdemir@gmail.com • Burp Suite Nedir? • Burp Suite Nasıl Kullanılır? • Burp Suite ile Brufe Force Saldırısı Nasıl Yapılır?
  • 6. OWASP | BURP SUİTE NEDİR? @owaspistanbul - rumeysabozdemir@gmail.com • JAVA dilinde yazılmıştır. • Web Proxy uygulamasıdır. • Web uygulama testlerinde kullanılır.
  • 7. OWASP | BURP SUİTE NASIL KULLANILIR? @owaspistanbul - rumeysabozdemir@gmail.com https://portswigger.net/
  • 8. OWASP | BURP SUİTE NASIL KULLANILIR? @owaspistanbul - rumeysabozdemir@gmail.com • Uygulama için ihtiyacımız olanlar; • Metasploitable 2 • https://sourceforge.net/projects/metasploitable/files/latest/download • Burp Suite Community Edition • https://portswigger.net/burp/communitydownload • Kali Linux • https://www.offensive-security.com/kali-linux-vm-vmware-virtualbox-image-download/
  • 9. OWASP | BURP SUİTE NASIL KULLANILIR? @owaspistanbul - rumeysabozdemir@gmail.com Kullanıcı Adı/Parola: msfadmin:msfadmin
  • 10. OWASP | BURP SUİTE NASIL KULLANILIR? @owaspistanbul - rumeysabozdemir@gmail.com Metasploitable 2 makinasını tarayıcı ile ziyaret et.
  • 11. OWASP | BRUFE FORCE SALDIRISI @owaspistanbul - rumeysabozdemir@gmail.com Hedef Web Uygulaması
  • 12. OWASP | BRUFE FORCE SALDIRISI @owaspistanbul - rumeysabozdemir@gmail.com
  • 13. OWASP | PROXY AYARI @owaspistanbul - rumeysabozdemir@gmail.com
  • 14. OWASP | PROXY AYARI @owaspistanbul - rumeysabozdemir@gmail.com
  • 15. OWASP | PROXY AYARI @owaspistanbul - rumeysabozdemir@gmail.com
  • 16. OWASP | BRUFE FORCE SALDIRISI @owaspistanbul - rumeysabozdemir@gmail.com
  • 17. OWASP | BRUFE FORCE SALDIRISI @owaspistanbul - rumeysabozdemir@gmail.com
  • 18. OWASP | BRUFE FORCE SALDIRISI @owaspistanbul - rumeysabozdemir@gmail.com
  • 19. OWASP | BRUFE FORCE SALDIRISI @owaspistanbul - rumeysabozdemir@gmail.com
  • 20. OWASP | BRUFE FORCE SALDIRISI @owaspistanbul - rumeysabozdemir@gmail.com
  • 21. OWASP | BRUFE FORCE SALDIRISI @owaspistanbul - rumeysabozdemir@gmail.com
  • 22. OWASP | BRUFE FORCE SALDIRISI @owaspistanbul - rumeysabozdemir@gmail.com
  • 23. OWASP | BRUFE FORCE SALDIRISI @owaspistanbul - rumeysabozdemir@gmail.com
  • 24. OWASP | BRUFE FORCE SALDIRISI @owaspistanbul - rumeysabozdemir@gmail.com
  • 25. OWASP | BRUFE FORCE SALDIRISI @owaspistanbul - rumeysabozdemir@gmail.com
  • 28. KAYNAKLAR @owaspistanbul - rumeysabozdemir@gmail.com • https://docs.rapid7.com/metasploit/metasploitable-2/ • https://sourceforge.net/projects/metasploitable/files/latest/downloa d • https://portswigger.net/burp/communitydownload • https://www.offensive-security.com/kali-linux-vm-vmware-virtualbox- image-download/ • https://addons.mozilla.org/en-US/firefox/addon/foxyproxy-standard/ • https://portswigger.net/support/using-burp-to-brute-force-a-login- page