- Kali Linux 2018:Assuring Security by Penetration Testing
- Shiva V. N Parasram Alex Samm Damian Boodoo Gerard Johansen Lee Allen Tedi Heriyanto Shakeel Ali
- 60字
- 2021-06-24 18:19:08
Exploits for Linux
Linux exploits are not typically targeted toward the operating system itself, but rather the services that are running. Here you will find a list of common exploits to run against Linux boxes. Keep in mind that exploits will vary across distros and service versions:
- CVE-2018-1111
- Red Hat Linux DHCP Client Found Vulnerable to Command Injection Attacks
- CVE-2017-7494
推薦閱讀
- Securing Blockchain Networks like Ethereum and Hyperledger Fabric
- 網絡安全意識導論
- 計算機使用安全與防護
- INSTANT Windows PowerShell
- Kali Linux Network Scanning Cookbook(Second Edition)
- 硬黑客:智能硬件生死之戰
- Learning Devise for Rails
- 網絡安全能力成熟度模型:原理與實踐
- 軟件安全保障體系架構
- API安全技術與實戰
- 先進云安全研究與實踐
- 空間群組密鑰管理研究:基于自主的深空DTN密鑰管理
- Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager
- 網絡空間安全導論
- 物聯網信息安全技術