- Building Virtual Pentesting Labs for Advanced Penetration Testing
- Kevin Cardwell
- 76字
- 2021-07-16 11:42:12
Chapter 3. Planning a Range
In this chapter, we will start the process of what is required to plan a test environment. We will discuss the process of searching and finding vulnerabilities to test, and create a lab environment for testing a type of vulnerability. We will discuss the following:
- Planning
- Identifying vulnerabilities
This chapter will provide us with a defined architecture to build and support the testing types that we have to perform.
推薦閱讀
- DevSecOps敏捷安全
- Securing Blockchain Networks like Ethereum and Hyperledger Fabric
- Learning Python for Forensics
- Practical Network Scanning
- 開發者的Web安全戒律:真實威脅與防御實踐
- 安全技術運營:方法與實踐
- 黑客攻防與無線安全從新手到高手(超值版)
- Kali Linux Wireless Penetration Testing Cookbook
- 諸神之眼:Nmap網絡安全審計技術揭秘
- 計算機網絡安全技術研究
- 從0到1:CTFer成長之路
- Falco云原生安全:Falco原理、實踐與擴展
- 互聯網企業安全高級指南
- 信息安全工程與實踐
- 捍衛隱私