- Learning Python Web Penetration Testing
- Christian Martorella
- 135字
- 2021-06-25 20:54:48
Specific task tools
We have a vast array of tools that are focused to specific tasks such as encoders and hashers, Base 64, MD5, SHA1, and Unicode.
Tools that are created to exploit a specific type of vulnerability are, for example, SQL injectors such as SQL map, XSS consoles such as Beef to demonstrate the impact of a XSS and DOM XSS, scanners such as Dominator, and many more. Also, an important type of tool in the tool kit is the post exploitation tool.
These tools are needed once you manage to exploit a vulnerability and help you to control the server, upload files, Shells, proxy content to the internal network, and expand your attack internally. There are many other tools to overcome the infinite challenges we find while testing new applications and technologies.
- 一步一步學Spring Boot 2:微服務項目實戰
- Learning C# by Developing Games with Unity 2020
- 程序設計與實踐(VB.NET)
- 數據結構和算法基礎(Java語言實現)
- 深入理解Django:框架內幕與實現原理
- Mastering QGIS
- OpenStack Cloud Computing Cookbook(Fourth Edition)
- Mastering LibGDX Game Development
- Java應用開發技術實例教程
- C#程序設計基礎:教程、實驗、習題
- Java Web程序設計任務教程
- Access 2010中文版項目教程
- 軟件項目管理實用教程
- Struts 2.x權威指南
- Learning Splunk Web Framework