- Hands-On Red Team Tactics
- Himanshu Sharma Harpreet Singh
- 63字
- 2021-08-13 15:36:35
Vulnerability analysis
This is a process of discovering flaws that can be used by an attacker. These flaws can be anything ranging from open ports/service misconfiguration to an SQL injection. There are lots of tools available that can help in performing a vulnerability analysis.
These include Nmap, Acunetix, and Burp Suite. We can also see new tools being released every few weeks.
推薦閱讀
- 綜合布線實訓教程(第3版)
- 計算機信息檢索
- 綜合布線設計與施工(第2版)
- 云計算導論:概念 架構與應用
- 網絡工程設計與實施(第2版)
- Axure RP 7.0從入門到精通:Web + APP產品經理原型設計
- Learning SaltStack
- pfSense 2.x Cookbook
- 監控平臺解密:IT系統風險感知和洞察
- OpenStack云計算基礎架構平臺技術與應用
- Laravel入門與實戰(第2版):構建主流PHP應用開發框架
- Cisco Unified Communications Manager 8:Expert Administration Cookbook
- 網頁設計與前端開發實用教程(Dreamweaver+CSS+Photoshop+JavaScript+HTML)
- 開源云計算平臺CloudStack實戰
- 網絡編碼研究基礎