- Kali Linux Cookbook(Second Edition)
- Corey P. Schultz Bob Perciaccante
- 180字
- 2021-07-02 18:27:09
Vulnerable workstations
One of the many questions frequently asked is why we soften machines or use machines that have vulnerabilities. The fact is that a properly patched, properly configured, and properly hardened machine is quite difficult to get into. Penetration testing is not trying to get through to hardened devices but looking specifically for those devices that have vulnerabilities. In a typical engagement, you may find only one or two machines that have vulnerabilities. You can then use these machines to gain a foothold into an environment to compromise other more hardened machines. If you start doing regular engagements as a penetration tester, you will be surprised by just how many machines you may be able to find that have vulnerabilities. This is especially true with the proliferation of low cost Internet of Things (IoT) devices such as internet connected cameras, thermostats, automation systems, and monitoring. These devices often run Linux-type embedded operating systems and are rarely patched and often overlooked. More importantly, they are often riddled with bugs and vulnerabilities that we can use for our purposes.
- Docker進階與實戰
- Python 深度學習
- OpenCV 3和Qt5計算機視覺應用開發
- 機械工程師Python編程:入門、實戰與進階
- Salesforce Reporting and Dashboards
- Building Machine Learning Systems with Python(Second Edition)
- Windows Embedded CE 6.0程序設計實戰
- Mastering ArcGIS Enterprise Administration
- Java Web應用開發項目教程
- 從0到1:HTML5 Canvas動畫開發
- Android Game Programming by Example
- UML軟件建模
- 從零開始:C語言快速入門教程
- UML基礎與Rose建模實用教程(第三版)
- C語言從入門到精通(視頻實戰版)