- Hands-On Penetration Testing with Kali NetHunter
- Glen D. Singh Sean Philip Oriyano
- 81字
- 2021-07-02 12:38:37
Section 2: Common Pentesting Tasks and Tools
In this section, we will learn how to gather, store, and process information. We'll also look at how to deploy payloads to a target and remove the fingerprints of a NetHunter attack.
The following chapters are in this section:
推薦閱讀
- unidbg逆向工程:原理與實(shí)踐
- Practical Network Scanning
- 零信任網(wǎng)絡(luò):在不可信網(wǎng)絡(luò)中構(gòu)建安全系統(tǒng)
- 暗戰(zhàn)亮劍:黑客滲透與防御全程實(shí)錄
- Enterprise Cloud Security and Governance
- 云原生安全與DevOps保障
- 編譯與反編譯技術(shù)實(shí)戰(zhàn)
- 網(wǎng)絡(luò)安全大數(shù)據(jù)分析與實(shí)戰(zhàn)
- Cybersecurity Threats,Malware Trends,and Strategies
- CTF快速上手:PicoCTF真題解析(Web篇)
- Mastering Malware Analysis
- 企業(yè)數(shù)據(jù)安全防護(hù)指南
- Developing Applications with Salesforce Chatter
- ATT&CK視角下的紅藍(lán)對(duì)抗實(shí)戰(zhàn)指南
- AI+網(wǎng)絡(luò)安全:智網(wǎng)融合空間體系建設(shè)指南