- Network Scanning Cookbook
- Sairam Jetty
- 85字
- 2021-08-13 15:14:19
Network architecture
It is always important to understand the placement of the IP address or the component on which we are performing vulnerability scanning. This will help us to customize our approach and to reduce false positives. For example, if Alice is trying to scan a web application hosted behind a web application firewall, she needs to customize the payloads or the scripts used to identify vulnerabilities using techniques such as encoding, to ensure that the payloads are not blocked by the web application firewall.
推薦閱讀
- 全國大學生電子設(shè)計競賽訓練教程
- 中國戰(zhàn)略性新興產(chǎn)業(yè)研究與發(fā)展·數(shù)據(jù)中心
- Rust Standard Library Cookbook
- Android板級支持與硬件相關(guān)子系統(tǒng)
- 機載激光雷達基礎(chǔ)原理與應(yīng)用
- 快修巧修新型手機(修訂版)
- 反相對稱-擴頻通信系統(tǒng)抗噪聲性能研究
- IPv6網(wǎng)絡(luò)部署實戰(zhàn)
- 高速數(shù)字電路設(shè)計入門
- 路由與交換技術(shù)
- 電子制造與封裝
- 電子線路基礎(chǔ)輕松入門
- 動手指,知天下:老年人學用智能手機
- 妙用微信微博就讀它
- 電子電路分析制作與調(diào)試