書(shū)名: Hands-On Penetration Testing with Kali NetHunter作者名: Glen D. Singh Sean Philip Oriyano本章字?jǐn)?shù): 47字更新時(shí)間: 2021-07-02 12:38:36
Gaining access
This is the exploitation phase where the penetration tester attempts to compromise a target system or network. During this phase, the penetration may create a custom payload to execute either remotely or on the actual target.
This phase has two objectives:
- Gain access
- Escalate privileges
推薦閱讀
- 網(wǎng)絡(luò)空間攻防技術(shù)原理
- 網(wǎng)絡(luò)安全應(yīng)急管理與技術(shù)實(shí)踐
- 信息系統(tǒng)安全檢測(cè)與風(fēng)險(xiǎn)評(píng)估
- INSTANT Burp Suite Starter
- 走進(jìn)新安全:讀懂網(wǎng)絡(luò)安全威脅、技術(shù)與新思想
- .NET安全攻防指南(上冊(cè))
- 網(wǎng)絡(luò)安全技術(shù)及應(yīng)用(第3版)
- 諸神之眼:Nmap網(wǎng)絡(luò)安全審計(jì)技術(shù)揭秘
- 持續(xù)集成:軟件質(zhì)量改進(jìn)和風(fēng)險(xiǎn)降低之道
- 信息技術(shù)基礎(chǔ):提高篇·實(shí)驗(yàn)與習(xí)題
- 復(fù)雜信息系統(tǒng)網(wǎng)絡(luò)安全體系建設(shè)指南
- Mastering Metasploit
- INSTANT Kali Linux
- 功能型密碼算法設(shè)計(jì)與分析
- Web安全攻防從入門(mén)到精通