Summary
This chapter introduced you to the various methodologies in penetration testing for the purpose of planning and scoping the penetration test. The next chapter will take you through discovering and gathering information and data about targets and environments using both passive and active techniques.
推薦閱讀
- Android應(yīng)用安全實(shí)戰(zhàn):Frida協(xié)議分析
- 網(wǎng)絡(luò)安全與管理
- 科技安全:戰(zhàn)略實(shí)踐與展望
- 計(jì)算機(jī)網(wǎng)絡(luò)安全技術(shù)(第6版·慕課版)
- 數(shù)字身份與元宇宙信任治理
- Learning Python for Forensics
- 諸神之眼:Nmap網(wǎng)絡(luò)安全審計(jì)技術(shù)揭秘
- Digital Forensics with Kali Linux
- 云原生安全與DevOps保障
- Kerberos域網(wǎng)絡(luò)安全從入門(mén)到精通
- 網(wǎng)絡(luò)安全與攻防入門(mén)很輕松(實(shí)戰(zhàn)超值版)
- 網(wǎng)絡(luò)安全應(yīng)急響應(yīng)實(shí)戰(zhàn)
- 網(wǎng)絡(luò)關(guān)鍵設(shè)備安全檢測(cè)實(shí)施指南
- Securing Network Infrastructure
- Developing Applications with Salesforce Chatter