官术网_书友最值得收藏!

Summary

This chapter covered how to discover information about a site's attack surface using automated scanners, passive proxy interception, and command-line utilities wired into our own homebrew setup, and a couple of things in between. You learned some handy third-party tools, and also how to use them and others within the context of custom automation. Hopefully you've come away  not only with a sense of the tactics (the code we've written), but of the strategy as well (the design behind it).

主站蜘蛛池模板: 昭通市| 汝州市| 长泰县| 明星| 同江市| 潍坊市| 河池市| 岳阳县| 叙永县| 公安县| 泽库县| 赫章县| 桓台县| 双辽市| 广西| 东源县| 乐平市| 达日县| 平武县| 阜阳市| 长兴县| 寻甸| 嘉黎县| 永川市| 丹凤县| 太和县| 禄劝| 枣庄市| 绥德县| 巴彦淖尔市| 手游| 大新县| 锡林郭勒盟| 南部县| 大荔县| 延庆县| 白山市| 南木林县| 西丰县| 屏南县| 台前县|