- Advanced Infrastructure Penetration Testing
- Chiheb Chebbi
- 113字
- 2021-06-24 19:12:55
Exploitation
By this stage, the penetration tester already has what he needs to launch his attack. Now he only needs to bypass security controls to gain access to the infrastructure system. During this phase, the penetration tester wears a black hat and tries to gain access to the infrastructure from a malicious hacker's perspective. After a good threat analysis, now it is time to exploit every vulnerability. In order to exploit these vulnerabilities, you can use a variety of automation tools and manual testing. The most famous exploitation tool is Metasploit, which is a must in every penetration tester's arsenal.

To explore the exploits, a user can use the show exploits command.
推薦閱讀
- Learning Windows Server Containers
- Ansible權威指南
- 蘋果電腦玩全攻略 OS X 10.8 Mountain Lion
- Instant Handlebars.js
- WindowsServer2012Hyper-V虛擬化部署與管理指南
- 操作系統基礎與實踐:基于openEuler平臺
- Kubernetes網絡權威指南:基礎、原理與實踐
- 混沌工程:復雜系統韌性實現之道
- 深入理解eBPF與可觀測性
- 數據中心系統工程及應用
- OpenStack系統架構設計實戰
- iOS 8開發指南
- Learning BeagleBone
- 大規模分布式系統架構與設計實戰
- Agile IT Security Implementation Methodology