- Hands-On Penetration Testing with Kali NetHunter
- Glen D. Singh Sean Philip Oriyano
- 57字
- 2021-07-02 12:38:34
The post-attack phase
The post-attack phase focuses on the cleaning up any items left behind during the attack phase. These are payloads, scripts, and other files used during the penetration test. The report is usually completed at the end of this phase and is delivered to the client, outlining the various security testing executed and their results.
推薦閱讀
- 工業互聯網安全
- Learning Veeam? Backup & Replication for VMware vSphere
- Python Penetration Testing Cookbook
- Instant Java Password and Authentication Security
- Web安全之深度學習實戰
- 無線傳感器網絡安全與加權復雜網絡抗毀性建模分析
- 實用黑客攻防技術
- 空間群組密鑰管理研究:基于自主的深空DTN密鑰管理
- Mastering Python for Networking and Security
- Mastering Linux Security and Hardening
- 云計算安全:關鍵技術、原理及應用
- Practical Internet of Things Security
- 數據恢復技術深度揭秘
- Blockchain Development with Hyperledger
- CCNA Security 210-260 Certification Guide