- Cybersecurity:Attack and Defense Strategies
- Yuri Diogenes Erdal Ozkaya
- 79字
- 2021-06-30 19:15:52
Scanning
In this subphase of reconaissance, an attacker will critically examine weak points identified in the reconnaissance phase. It involves the use of various scanning tools to find loopholes that can be exploited to stage an attack. Attackers take a considerable amount of time in this stage as they know that it determines a significant percentage of their success.
From the numerous available scanning tools, the ones presented in the sections that follow are the most commonly used ones.
推薦閱讀
- Implementing Cisco UCS Solutions
- Windows Vista基礎(chǔ)與應用精品教程
- PLC控制系統(tǒng)應用與維護
- Linux網(wǎng)絡(luò)內(nèi)核分析與開發(fā)
- 深入理解eBPF與可觀測性
- 網(wǎng)絡(luò)操作系統(tǒng)教程:Windows Server 2016管理與配置
- AWS SysOps Cookbook
- Cassandra 3.x High Availability(Second Edition)
- Kali Linux高級滲透測試(原書第3版)
- Advanced Infrastructure Penetration Testing
- Hadoop Real-World Solutions Cookbook
- bash shell腳本編程經(jīng)典實例(第2版)
- 應急指揮信息系統(tǒng)設(shè)計
- Linux操作系統(tǒng)案例教程(第2版)
- Learn Quantum Computing with Python and IBM Quantum Experience