官术网_书友最值得收藏!

Preface

The penetration testing technology today is riddled with oversimplified Graphical User Interfaces. Though easy to use, they often offer very little control over the operations they perform and don't offer a very informative experience to their users. Another drawback is that many of these security assessment solutions are only developed to identify and automate exploitation for the most obvious and unobfuscated instances of vulnerabilities. For every other practical instance of a vulnerability, penetration testers need to rely on their own scripts and assessment tools.

The basic skill set of a good penetration tester includes at least rudimentary skills in a scripting or software development languages such as bash scripting, Python, Go, Ruby, and so on. This is so that they can handle the weird and outlier instances of vulnerabilities with their own customized tools and are capable of automating security testing according to their own terms. Firewalls, intrusion detection/prevention systems, and other security monitoring solutions are becoming smarter, and the only way we, as penetration testers, are ever going to beat them is by learning to build our own tools to "weaponize" our command lines.

This book introduces some of the fundamental skills, tips, tricks, and command-line-driven utilities that the best penetration testers from all across the world use to ensure that they have as much control over their testing activities as possible. Anyone interested in introducing themselves to the command line specifically for penetration testing or penetration testing as a whole, will benefit from reading this book.

主站蜘蛛池模板: 兖州市| 大理市| 民县| 东源县| 宾阳县| 北票市| 云安县| 温泉县| 安阳县| 灵石县| 郁南县| 南木林县| 扶沟县| 西昌市| 新源县| 喀喇沁旗| 宜春市| 博湖县| 武清区| 武强县| 富锦市| 庆元县| 卫辉市| 招远市| 枝江市| 台州市| 宁安市| 通州市| 密山市| 广宗县| 手游| 绥阳县| 昌黎县| 筠连县| 高青县| 科技| 北川| 苍溪县| 兰溪市| 青河县| 勃利县|