- Hands-On Penetration Testing with Kali NetHunter
- Glen D. Singh Sean Philip Oriyano
- 97字
- 2021-07-02 12:38:36
Summary
In this chapter, we took a look at the need for penetration testing in today's world and for the future. As new threats emerge, the security of our assets and data is more at risk than ever. We did a brief comparison and contrasted between different types of hackers and their possible motives for hacking. Furthermore, we discussed the need for various security teams within an organization to help improve the security posture of the ever-growing threat landscape, and finally, we discussed hacking methodologies and concepts.
In the next chapter, we will be covering intelligence-gathering tools.
推薦閱讀
- Kali Linux Social Engineering
- Getting Started with FortiGate
- 網絡安全設計、配置與管理大全
- Cybersecurity Threats,Malware Trends,and Strategies
- Mastering Metasploit
- INSTANT Kali Linux
- Real-World SRE
- 動態賦能網絡空間防御
- BeagleBone for Secret Agents
- INSTANT Microsoft Forefront UAG Mobile Configuration Starter
- 計算機網絡安全與應用技術(第2版)
- 網絡安全攻防技術實戰
- 精通Metasploit滲透測試(第3版)
- 復雜網絡環境下訪問控制技術
- 網絡安全技術及應用實踐教程