官术网_书友最值得收藏!

What this book covers

Chapter 1, Starting Out with BackBox Linux, introduces BackBox Linux and the organization of the tools and services with a brief description of the tools included.

Chapter 2, Information Gathering, introduces us to a few ways of collecting useful information about the target system.

Chapter 3, Vulnerability Assessment and Management, explains how to perform vulnerability scans.

Chapter 4, Exploitations, uses the information we have collected in the previous chapters.

Chapter 5, Eavesdropping and Privilege Escalation, helps us in performing eavesdropping and privilege escalation on the target system where we already gained access by having obtained the access credentials in the previous chapter.

Chapter 6, Maintaining Access, helps us to set up backdoors in order to maintain access without repeating the steps covered in the previous chapters.

Chapter 7, Penetration Testing Methodologies with BackBox, helps us to perform a complete penetration test step-by-step, starting from information gathering to gaining access.

Chapter 8, Documentation and Reporting, explains how to create human-readable reports of our auditing tasks.

主站蜘蛛池模板: 夏津县| 五指山市| 滁州市| 潍坊市| 四子王旗| 临洮县| 封开县| 上虞市| 兰州市| 廊坊市| 儋州市| 绿春县| 东乌珠穆沁旗| 镇沅| 南康市| 宁远县| 乌恰县| 友谊县| 涟源市| 余庆县| 湖口县| 泸州市| 德庆县| 胶州市| 阳江市| 万年县| 达尔| 临泽县| 巴青县| 邻水| 县级市| 遂宁市| 皋兰县| 嘉禾县| 嫩江县| 张家川| 和平区| 九寨沟县| 都昌县| 从江县| 博客|