- Advanced Infrastructure Penetration Testing
- Chiheb Chebbi
- 59字
- 2021-06-24 19:12:47
Gaining access
At this stage, the attacker already has what they need to launch their attack, including IP range, identified systems, services, user lists, security vulnerabilities, and flows. Now they only need to bypass security controls to gain access to the system, using several techniques such as password cracking, social engineering or privilege escalation, and gaining other user permissions.
推薦閱讀
- 樂學Windows操作系統
- Linux Mint Essentials
- STM32庫開發實戰指南:基于STM32F4
- Mobile First Design with HTML5 and CSS3
- 計算機系統:基于x86+Linux平臺
- 分布式系統設計實踐
- Learning BeagleBone
- Linux軟件管理平臺設計與實現
- Linux內核API完全參考手冊(第2版)
- OpenHarmony開發與實踐:基于紅莓RK2206開發板
- 操作系統之哲學原理第2版
- 再也不踩坑的kubernetes實戰指南
- Android Telephony原理解析與開發指南
- Docker for Developers
- Windows PE權威指南