- Hands-On Penetration Testing with Kali NetHunter
- Glen D. Singh Sean Philip Oriyano
- 81字
- 2021-07-02 12:38:37
Section 2: Common Pentesting Tasks and Tools
In this section, we will learn how to gather, store, and process information. We'll also look at how to deploy payloads to a target and remove the fingerprints of a NetHunter attack.
The following chapters are in this section:
推薦閱讀
- Extending Symfony2 Web Application Framework
- 白話網(wǎng)絡(luò)安全2:網(wǎng)安戰(zhàn)略篇
- 黑客大曝光:無(wú)線網(wǎng)絡(luò)安全(原書第3版)
- CSO進(jìn)階之路:從安全工程師到首席安全官
- 電子支付的規(guī)制結(jié)構(gòu)配置研究
- 深入淺出隱私計(jì)算:技術(shù)解析與應(yīng)用實(shí)踐
- 同態(tài)密碼學(xué)原理及算法
- Kali Linux Wireless Penetration Testing Cookbook
- 網(wǎng)絡(luò)運(yùn)維親歷記 (網(wǎng)絡(luò)運(yùn)維紀(jì)實(shí)文學(xué))
- 安全防御入門手冊(cè)
- 無(wú)線傳感器網(wǎng)絡(luò)安全與加權(quán)復(fù)雜網(wǎng)絡(luò)抗毀性建模分析
- 博弈論與數(shù)據(jù)安全
- 數(shù)據(jù)安全架構(gòu)設(shè)計(jì)與實(shí)戰(zhàn)
- 華為Anti-DDoS技術(shù)漫談
- 云計(jì)算安全防護(hù)技術(shù)