- Hands-On Bug Hunting for Penetration Testers
- Joseph Marshall
- 112字
- 2021-07-16 17:53:07
Technical Requirements
This chapter, like many, will rely on a unix command shell (zsh) to bootstrap and interact with programs installed via their graphical installer, a package manager (homebrew), or a tarball. It will also include several desktop apps, all of which we'll install, via similar methods, into a macOS High Sierra (10.13.2) environment. When a web browser is required, we will use Chrome (66.0.3359.139).
For some of these, there will be an explicit Windows option. In that case, the menus may look different but the available actions will be the same. When no Windows option is available, you might have to dual-boot with one of the more user-friendly Linux distros.
推薦閱讀
- 網絡空間攻防技術原理
- 網絡安全意識導論
- Wireshark 2 Quick Start Guide
- Enterprise Cloud Security and Governance
- Learning Veeam? Backup & Replication for VMware vSphere
- 代碼審計:企業級Web代碼安全架構
- Kali Linux Wireless Penetration Testing Cookbook
- 網絡空間安全實驗
- Web安全之深度學習實戰
- 人工智能安全(精裝版)
- Learning Pentesting for Android Devices
- 信息安全工程與實踐
- 華為Anti-DDoS技術漫談
- Mastering Malware Analysis
- 計算機網絡安全實驗指導