- Kali Linux 2018:Assuring Security by Penetration Testing
- Shiva V. N Parasram Alex Samm Damian Boodoo Gerard Johansen Lee Allen Tedi Heriyanto Shakeel Ali
- 98字
- 2021-06-24 18:19:08
Exploits
Sometimes the tester may come across services that can be exploited. An exploit may be the means of initial access; just be sure that the exploit is 100% reliable. Also, running an exploit multiple times may crash the system. This option for initial access is typically used with extreme care, unless you have tested it and know what you are doing.
It's always SSH! Maybe it's not always, but I have never seen/can remember another service being used, outside of telnet, which should not be used anyways. SSH goes with Linux like peanut butter goes with jelly.
推薦閱讀
- Android應用安全實戰:Frida協議分析
- RESTful Java Web Services Security
- Securing Blockchain Networks like Ethereum and Hyperledger Fabric
- 暗戰亮劍:黑客滲透與防御全程實錄
- Mastering Kali Linux for Advanced Penetration Testing
- 反黑命令與攻防從新手到高手(微課超值版)
- INSTANT Windows PowerShell
- 同態密碼學原理及算法
- 硬黑客:智能硬件生死之戰
- 網絡空間安全實驗
- 云原生安全技術實踐指南
- Web安全之深度學習實戰
- 空間群組密鑰管理研究:基于自主的深空DTN密鑰管理
- 網絡安全實戰詳解(企業專供版)
- Android Application Security Essentials