- Hands-On Red Team Tactics
- Himanshu Sharma Harpreet Singh
- 79字
- 2021-08-13 15:36:34
Pentesting 101
As we all know, penetration testing follows a standard. There are various standards, such as the Open Web Application Security Project (OWASP), the Open Source Security Testing Methodology Manual (OSSTMM), the Information Systems Security Assessment Framework (ISSAF), and so on. Most of them follow the same methodology, but the phases have been named differently. We will take a look at each of them in the following sections and cover the Penetration Testing Execution Standards (PTES) in detail.
推薦閱讀
- Windows 8實(shí)戰(zhàn)從入門(mén)到精通
- .NET Core 2.0 應(yīng)用程序高級(jí)調(diào)試:完全掌握Linux、macOS和Windows跨平臺(tái)調(diào)試技術(shù)
- 安全之美
- 計(jì)算機(jī)信息檢索
- 大東話安全之網(wǎng)絡(luò)病毒篇
- 地理信息系統(tǒng)中的不確定性問(wèn)題
- 矛與盾:黑客就這幾招
- Laravel入門(mén)與實(shí)戰(zhàn)(第2版):構(gòu)建主流PHP應(yīng)用開(kāi)發(fā)框架
- 網(wǎng)絡(luò)設(shè)備配置與管理
- 計(jì)算機(jī)網(wǎng)絡(luò)
- 信息安全技術(shù)
- NS2仿真實(shí)驗(yàn)
- 矛與盾:黑客攻防命令大曝光
- 制造網(wǎng)格
- Adobe Dreamweaver 2020基礎(chǔ)培訓(xùn)教材