- Kali Linux:An Ethical Hacker's Cookbook
- Himanshu Sharma
- 47字
- 2021-07-08 09:41:17
Getting a list of subdomains
We don't always we have a situation where a client has defined a full detailed scope of what needs to be pentested. So we will use the following mentioned recipes to gather as much information as we can to perform a pentest.
推薦閱讀
- ClickHouse性能之巔:從架構設計解讀性能之謎
- Advanced Machine Learning with Python
- Google Apps Script for Beginners
- Android開發精要
- Jenkins Continuous Integration Cookbook(Second Edition)
- Python數據結構與算法(視頻教學版)
- Multithreading in C# 5.0 Cookbook
- 后臺開發:核心技術與應用實踐
- Java Web開發實例大全(基礎卷) (軟件工程師開發大系)
- Mobile Forensics:Advanced Investigative Strategies
- PHP Microservices
- Java EE實用教程
- Serverless工程實踐:從入門到進階
- Laravel 5.x Cookbook
- Python程序設計現代方法