- Hands-On Penetration Testing with Kali NetHunter
- Glen D. Singh Sean Philip Oriyano
- 97字
- 2021-07-02 12:38:36
Summary
In this chapter, we took a look at the need for penetration testing in today's world and for the future. As new threats emerge, the security of our assets and data is more at risk than ever. We did a brief comparison and contrasted between different types of hackers and their possible motives for hacking. Furthermore, we discussed the need for various security teams within an organization to help improve the security posture of the ever-growing threat landscape, and finally, we discussed hacking methodologies and concepts.
In the next chapter, we will be covering intelligence-gathering tools.
推薦閱讀
- Extending Symfony2 Web Application Framework
- 數據恢復方法及案例分析
- Metasploit Penetration Testing Cookbook(Second Edition)
- 黑客攻防技巧
- 計算機使用安全與防護
- 代碼審計:企業級Web代碼安全架構
- 防火墻技術與應用(第2版)
- 解密數據恢復
- 華為防火墻實戰指南
- CTF特訓營:技術詳解、解題方法與競賽技巧
- Mastering Linux Security and Hardening
- Hands-On Artificial Intelligence for Cybersecurity
- 企業數據安全防護指南
- INSTANT Kali Linux
- 網絡空間安全實戰基礎