- Advanced Infrastructure Penetration Testing
- Chiheb Chebbi
- 50字
- 2021-06-24 19:12:56
Data exfiltration
During data exfiltration, the pentester maps all the exfiltration paths. The aim of this step is to make sure that there is no data leaving the organization in a sneaky way. Analyzing the data flow is of high priority, whereas data is the center of attention for hackers.
推薦閱讀
- pcDuino開發實戰
- Designing Purpose:Built Drones for Ardupilot Pixhawk 2.1
- 大學計算機應用基礎實踐教程(Windows 7+Office 2013)
- Ubuntu Linux操作系統
- 深入理解eBPF與可觀測性
- AWS Development Essentials
- Ceph分布式存儲實戰
- Python UNIX和Linux系統管理指南
- Windows 7使用詳解(修訂版)
- Mastering Windows 8 C++ App Development
- Linux網絡操作系統項目教程(RHEL 7.4/CentOS 7.4)(第3版)(微課版)
- Learn OpenShift
- Microsoft Hyper-V Cluster Design
- 程序員必讀經典(算法基礎+計算機系統)
- UNIX傳奇:歷史與回憶