- Hands-On Red Team Tactics
- Himanshu Sharma Harpreet Singh
- 79字
- 2021-08-13 15:36:34
Pentesting 101
As we all know, penetration testing follows a standard. There are various standards, such as the Open Web Application Security Project (OWASP), the Open Source Security Testing Methodology Manual (OSSTMM), the Information Systems Security Assessment Framework (ISSAF), and so on. Most of them follow the same methodology, but the phases have been named differently. We will take a look at each of them in the following sections and cover the Penetration Testing Execution Standards (PTES) in detail.
推薦閱讀
- Windows 8實(shí)戰(zhàn)從入門到精通
- 計(jì)算機(jī)信息檢索
- 綜合布線設(shè)計(jì)與施工(第2版)
- OPENStack云框架應(yīng)用管理實(shí)踐
- 巧學(xué)巧用Dreamweaver CS6、Flash CS6、Fireworks CS6網(wǎng)站制作
- CSS網(wǎng)頁布局與瀏覽器兼容
- 華為云計(jì)算HCIA實(shí)驗(yàn)指南(第二版)
- Web標(biāo)準(zhǔn)網(wǎng)頁設(shè)計(jì)原理與前端開發(fā)技術(shù)
- ns-3網(wǎng)絡(luò)模擬器基礎(chǔ)及應(yīng)用
- 云原生模式
- CSS新世界
- 智慧網(wǎng)絡(luò)協(xié)同組織機(jī)理
- 阿里云云原生架構(gòu)實(shí)踐
- 信息安全技術(shù)
- 網(wǎng)站組建、管理與維護(hù)