- Hands-On Red Team Tactics
- Himanshu Sharma Harpreet Singh
- 104字
- 2021-08-13 15:36:37
Pentesting 2018
For the past few years, we have been using tools such as the Metasploit Framework, routersploit, LinuxEnum.sh, nmap, and so on for post-exploitation and scanning. With the growing popularity of new tools, it would be good to learn about some new tools that can be used for post-exploitation. Out of the many available tools, we will be looking at MSFvenom Payload Creator (MSFPC)—a simple MSF-based payload generator; and Koadic—a COM-based Command and Control (C3) server, which can be used in red-team operations or penetration testing for post-exploitation.
In this chapter, we will cover the following tools:
- MSFPC
- Kaodic
推薦閱讀
- Solaris 10系統(tǒng)管理
- 網(wǎng)站建設(shè)與管理
- Learning SaltStack
- 矛與盾:黑客攻防與腳本編程
- Web標(biāo)準(zhǔn)網(wǎng)頁設(shè)計原理與前端開發(fā)技術(shù)
- 云計算數(shù)據(jù)中心規(guī)劃與設(shè)計
- 掌控你的工作?。呵捎肙utlook極速提升工作效率
- CSS新世界
- 深度學(xué)習(xí):主流框架和編程實戰(zhàn)
- Axure RP 8 網(wǎng)站與APP原型設(shè)計
- 虛擬網(wǎng)構(gòu)建及其應(yīng)用
- 網(wǎng)站組建、管理與維護
- 開源云計算平臺CloudStack實戰(zhàn)
- Ajax 實用技術(shù)
- Learning Bing Maps API