- Kali Linux 2018:Assuring Security by Penetration Testing
- Shiva V. N Parasram Alex Samm Damian Boodoo Gerard Johansen Lee Allen Tedi Heriyanto Shakeel Ali
- 98字
- 2021-06-24 18:19:08
Exploits
Sometimes the tester may come across services that can be exploited. An exploit may be the means of initial access; just be sure that the exploit is 100% reliable. Also, running an exploit multiple times may crash the system. This option for initial access is typically used with extreme care, unless you have tested it and know what you are doing.
It's always SSH! Maybe it's not always, but I have never seen/can remember another service being used, outside of telnet, which should not be used anyways. SSH goes with Linux like peanut butter goes with jelly.
推薦閱讀
- Applied Network Security
- 從0到1:CTFer成長之路
- Building a Home Security System with BeagleBone
- SQL Injection Strategies
- 編譯與反編譯技術(shù)實戰(zhàn)
- INSTANT Apple Configurator How-to
- 網(wǎng)絡(luò)服務(wù)安全與監(jiān)控
- 企業(yè)數(shù)據(jù)安全防護(hù)指南
- 功能型密碼算法設(shè)計與分析
- 聯(lián)邦學(xué)習(xí)原理與算法
- 2023—2024年中國網(wǎng)絡(luò)安全發(fā)展藍(lán)皮書
- 計算機(jī)網(wǎng)絡(luò)安全與應(yīng)用技術(shù)(第2版)
- 大話數(shù)據(jù)恢復(fù)
- Hands-On Spring Security 5 for Reactive Applications
- 數(shù)據(jù)中心安全防護(hù)技術(shù)