Summary
This chapter introduced you to the various methodologies in penetration testing for the purpose of planning and scoping the penetration test. The next chapter will take you through discovering and gathering information and data about targets and environments using both passive and active techniques.
推薦閱讀
- 攻守道:企業(yè)數(shù)字業(yè)務(wù)安全風(fēng)險(xiǎn)與防范
- 黑客攻防與電腦安全從新手到高手(微視頻+火力升級(jí)版)
- 暗戰(zhàn)亮劍:黑客滲透與防御全程實(shí)錄
- INSTANT Windows PowerShell
- 同態(tài)密碼學(xué)原理及算法
- 黑客攻防與網(wǎng)絡(luò)安全從新手到高手(絕招篇)
- 信息安全案例教程:技術(shù)與應(yīng)用(第2版)
- 信息安全等級(jí)保護(hù)測(cè)評(píng)與整改指導(dǎo)手冊(cè)
- 從實(shí)踐中學(xué)習(xí)密碼安全與防護(hù)
- 數(shù)據(jù)保護(hù):工作負(fù)載的可恢復(fù)性
- Bug Bounty Hunting Essentials
- 信息安全工程與實(shí)踐
- 網(wǎng)絡(luò)空間安全法律問(wèn)題研究
- Securing Network Infrastructure
- 云安全深度剖析:技術(shù)原理及應(yīng)用實(shí)踐