Scanning and enumeration
Without a doubt, almost every security professional wants to jump straight into exploiting boxes, but without understanding the basics, the exploits, and most importantly, the environment they are in. This can lead to mistakes or worse, such as breaking things in a live environment.
Scanning and enumeration allows a pen tester to understand their environment. The result one gets from these scans gives the red team a starting point to leverage vulnerabilities in different systems. Scanning is finding all available network services (TCP and UDP) running on the targeted hosts. This can help a red teamer discover whether SSH/Telnet is open to try a brute-force login and discover file shares to download data from, websites that may have vulnerabilities, or printers that may hold usernames and passwords. Enumeration is the discovery of services on the network to have a greater sense of information provided by the network services.
- 攻守道:企業(yè)數(shù)字業(yè)務(wù)安全風(fēng)險(xiǎn)與防范
- SASE原理、架構(gòu)與實(shí)踐
- 網(wǎng)絡(luò)空間攻防技術(shù)原理
- 黑客攻防與電腦安全從新手到高手(微視頻+火力升級(jí)版)
- 電子支付的規(guī)制結(jié)構(gòu)配置研究
- 安全技術(shù)運(yùn)營:方法與實(shí)踐
- 網(wǎng)絡(luò)安全技術(shù)及應(yīng)用(第3版)
- Testing and Securing Android Studio Applications
- Computer Forensics with FTK
- Building a Home Security System with BeagleBone
- Learning Pentesting for Android Devices
- 數(shù)據(jù)安全架構(gòu)設(shè)計(jì)與實(shí)戰(zhàn)
- 云計(jì)算安全防護(hù)技術(shù)
- 功能型密碼算法設(shè)計(jì)與分析
- 云計(jì)算安全:關(guān)鍵技術(shù)、原理及應(yīng)用