Enumeration
Enumeration serves as a base for all of the attacks and weaknesses found in the web applications. The development view merges these attacks and weaknesses into vulnerabilities and categorizes them according to their occurrence in the relative development phase. This could be a design, implementation, or deployment phase. There are several enumeration techniques; we will have a look at a few.
推薦閱讀
- 網(wǎng)絡(luò)安全意識(shí)導(dǎo)論
- 深入淺出隱私計(jì)算:技術(shù)解析與應(yīng)用實(shí)踐
- Preventing Digital Extortion
- 網(wǎng)絡(luò)安全技術(shù)及應(yīng)用(第3版)
- API攻防:Web API安全指南
- 黑客攻防與無(wú)線安全從新手到高手(超值版)
- 防火墻技術(shù)與應(yīng)用(第2版)
- 從0到1:CTFer成長(zhǎng)之路
- 軟件安全保障體系架構(gòu)
- 數(shù)據(jù)要素安全:新技術(shù)、新安全激活新質(zhì)生產(chǎn)力
- 華為Anti-DDoS技術(shù)漫談
- Mastering Linux Security and Hardening
- Mastering Python for Networking and Security
- 企業(yè)數(shù)據(jù)安全防護(hù)指南
- 網(wǎng)絡(luò)空間安全法律問題研究