- Hands-On Penetration Testing with Kali NetHunter
- Glen D. Singh Sean Philip Oriyano
- 151字
- 2021-07-02 12:38:36
Deliverables
At the end of a penetration test, a report is provided to the client that outlines all the vulnerabilities found with full details. The penetration test report also contains evidence of the vulnerabilities compromised per system to indicate the proof of concept. This can be helpful for the client’s security team to implement mitigation techniques and prevention controls on their infrastructure. Some penetration-testing reports contain mitigation techniques while others don’t. This is determined by the mutual agreement between the client and the penetration tester of the services to be rendered.
Most importantly, the report is a full summary of the event and actions of the tests conducted and the outcome of each. As penetration testers, our write-ups tend to be a bit too technical at times, however our final report should be written at an executive level where non-technical people can read and understand them.
- 網絡空間安全:管理者讀物
- 黑客攻防入門秘笈
- Enterprise Cloud Security and Governance
- Python Penetration Testing Cookbook
- 電腦安全與攻防入門很輕松(實戰超值版)
- 網絡用戶行為的安全可信分析與控制
- CTF快速上手:PicoCTF真題解析(Web篇)
- 捍衛隱私
- Mastering Python for Networking and Security
- 功能型密碼算法設計與分析
- 計算機系統與網絡安全研究
- Web代碼安全漏洞深度剖析
- 隱私保護機器學習
- Real-World SRE
- Instant OSSEC Host-based Intrusion Detection System