- Web Penetration Testing with Kali Linux(Third Edition)
- Gilberto Najera Gutierrez Juned Ahmed Ansari
- 187字
- 2021-06-24 18:44:50
Client IT team notifications
Penetration tests are also used as a means to check the readiness of the support staff in responding to incidents and intrusion attempts. You should discuss this with the client whether it is an announced or unannounced test. If it's an announced test, make sure that you inform the client of the time and date, as well as the source IP addresses from where the testing (attack) will be done, in order to avoid any real intrusion attempts being missed by their IT security team. If it's an unannounced test, discuss with the client what will happen if the test is blocked by an automated system or network administrator. Does the test end there, or do you continue testing? It all depends on the aim of the test, whether it's conducted to test the security of the infrastructure or to check the response of the network security and incident handling team. Even if you are conducting an unannounced test, make sure that someone in the escalation matrix knows about the time and date of the test. Web application penetration tests are usually announced.
- 電腦組裝與系統安裝
- Linux設備驅動開發詳解(第2版)
- Cybersecurity:Attack and Defense Strategies
- Mobile-first Bootstrap
- Kubernetes網絡權威指南:基礎、原理與實踐
- Windows Server 2012 Hyper-V Cookbook
- 新手易學:系統安裝與重裝
- 細說Linux基礎知識
- iOS 8開發指南
- AWS SysOps Cookbook
- Vim 8文本處理實戰
- Linux從入門到精通(視頻教學版)
- Android NDK Beginner's Guide
- 大規模Linux集群架構最佳實踐:如何管理上千臺服務器
- Getting Started with Raspberry Pi Zero