- Hands-On Penetration Testing with Kali NetHunter
- Glen D. Singh Sean Philip Oriyano
- 57字
- 2021-07-02 12:38:34
The post-attack phase
The post-attack phase focuses on the cleaning up any items left behind during the attack phase. These are payloads, scripts, and other files used during the penetration test. The report is usually completed at the end of this phase and is delivered to the client, outlining the various security testing executed and their results.
推薦閱讀
- unidbg逆向工程:原理與實踐
- Mobile Forensics Cookbook
- 黑客大曝光:無線網絡安全(原書第3版)
- 網絡安全保障能力研究
- Practical Network Scanning
- Getting Started with FortiGate
- Preventing Digital Extortion
- 網絡安全技術與實訓(第4版)(微課版)
- 從0到1:CTFer成長之路
- Instant Java Password and Authentication Security
- SQL Injection Strategies
- 信息安全工程與實踐
- Mastering Linux Security and Hardening
- 互聯網域名國際化與安全技術導論
- 網絡安全攻防技術實戰