Announcement

Collapse
No announcement yet.

My NinjaBrowser concept was stolen by the BurpProxy.

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • My NinjaBrowser concept was stolen by the BurpProxy.

    My NinjaBrowser concept was stolen by the BurpProxy.

    If so, I would like to explain more ideas for the future security systems I envision.
    First, let's start by describing the cloud security system business model.
    You steal more of my ideas and incorporate them into your products.
    These contents will be explained in
    GNUSYS LAB.

    Download:
    https://powerhacker.net/documents/Bu...nal.2020.8.rar
    Sorry, but I'm far from an ethical hacker.

    P.S:
    The unfortunate thing is that it doesn't support
    Adobe Flash.
    I haven't found a way to re-enable
    Adobe Flash yet.

    P.S2:
    I would like to give you one advice.
    If you want to participate in a mobile application vulnerability testing project, you need to prepare
    SSL Pinning Bypass technology in advance to take advantage of the burpproxy.
    There are two versions of this technique.
    If possible, use the latest version of the technology.
    There are many resources available on the Internet.
    The
    BurpBrowser cannot be used in mobile tests.

    P.S3:
    I recommend using
    DroidProxy instead of Android's built-in feature for proxy. (You must use global mode to set proxy mode.)


    Click image for larger version  Name:	NinjaBrowser.png Views:	0 Size:	96.9 KB ID:	664

  • #2
    chuka chuka. it's your good point to steal your idea by BurpProxy project. You have good possiblity i thought.
    Thanks!

    Comment

    Working...
    X