- Advanced Infrastructure Penetration Testing
- Chiheb Chebbi
- 73字
- 2021-06-24 19:12:58
Advanced Linux Exploitation
Now that we have a clear understanding of the different penetration testing methodologies, phases, and requirements, the game is just starting. It is time to buckle your seat belt because, in this chapter, you will dive into securing the Linux environment, from a high-level overview of Linux infrastructure penetration testing, to discovering the dark depths of kernel vulnerabilities. This chapter outlines the skills and tools required to bulletproof Linux infrastructures.
推薦閱讀
- Linux設(shè)備驅(qū)動開發(fā)詳解:基于最新的Linux4.0內(nèi)核
- pcDuino開發(fā)實(shí)戰(zhàn)
- Designing Purpose:Built Drones for Ardupilot Pixhawk 2.1
- FreeRTOS實(shí)時內(nèi)核應(yīng)用指南
- 深入理解eBPF與可觀測性
- Mastering Reactive JavaScript
- OpenStack系統(tǒng)架構(gòu)設(shè)計實(shí)戰(zhàn)
- Django Project Blueprints
- 跟老男孩學(xué)Linux運(yùn)維:Shell編程實(shí)戰(zhàn)
- Cassandra 3.x High Availability(Second Edition)
- Introduction to R for Quantitative Finance
- bash shell腳本編程經(jīng)典實(shí)例(第2版)
- Android應(yīng)用性能優(yōu)化最佳實(shí)踐
- 應(yīng)急指揮信息系統(tǒng)設(shè)計
- OpenHarmony開發(fā)與實(shí)踐:基于紅莓RK2206開發(fā)板