官术网_书友最值得收藏!

Advanced Linux Exploitation

Now that we have a clear understanding of the different penetration testing methodologies, phases, and requirements, the game is just starting. It is time to buckle your seat belt because, in this chapter, you will dive into securing the Linux environment, from a high-level overview of Linux infrastructure penetration testing, to discovering the dark depths of kernel vulnerabilities. This chapter outlines the skills and tools required to bulletproof Linux infrastructures.

主站蜘蛛池模板: 娱乐| 曲松县| 连山| 东阿县| 岳阳县| 大冶市| 乐清市| 观塘区| 巴塘县| 永丰县| 安新县| 通江县| 香河县| 麟游县| 平度市| 迁西县| 博客| 武平县| 荥经县| 滁州市| 韶关市| 长海县| 项城市| 房山区| 瓦房店市| 芜湖市| 东阳市| 大同县| 塔河县| 长汀县| 松江区| 新田县| 涟源市| 垦利县| 曲沃县| 津南区| 九龙坡区| 玛纳斯县| 阿坝| 罗甸县| 社旗县|