Summary
This chapter introduced you to the various methodologies in penetration testing for the purpose of planning and scoping the penetration test. The next chapter will take you through discovering and gathering information and data about targets and environments using both passive and active techniques.
推薦閱讀
- CTF實戰:技術、解題與進階
- 黑客大曝光:無線網絡安全(原書第3版)
- Kali Linux CTF Blueprints
- Metasploit Penetration Testing Cookbook(Third Edition)
- 工業物聯網安全
- Testing and Securing Android Studio Applications
- Applied Network Security
- 解密彩虹團隊非凡實戰能力:企業安全體系建設(共5冊)
- 學電腦安全與病毒防范
- 信息安全等級保護測評與整改指導手冊
- 計算機網絡安全實驗指導
- Practical Mobile Forensics
- Instant OSSEC Host-based Intrusion Detection System
- CTF網絡安全競賽入門教程
- 黑客攻防從入門到精通:絕招版(第2版)