- Web Penetration Testing with Kali Linux(Third Edition)
- Gilberto Najera Gutierrez Juned Ahmed Ansari
- 187字
- 2021-06-24 18:44:50
Client IT team notifications
Penetration tests are also used as a means to check the readiness of the support staff in responding to incidents and intrusion attempts. You should discuss this with the client whether it is an announced or unannounced test. If it's an announced test, make sure that you inform the client of the time and date, as well as the source IP addresses from where the testing (attack) will be done, in order to avoid any real intrusion attempts being missed by their IT security team. If it's an unannounced test, discuss with the client what will happen if the test is blocked by an automated system or network administrator. Does the test end there, or do you continue testing? It all depends on the aim of the test, whether it's conducted to test the security of the infrastructure or to check the response of the network security and incident handling team. Even if you are conducting an unannounced test, make sure that someone in the escalation matrix knows about the time and date of the test. Web application penetration tests are usually announced.
- Cybersecurity:Attack and Defense Strategies
- Puppet實戰
- 蘋果電腦玩全攻略 OS X 10.8 Mountain Lion
- Mastering Distributed Tracing
- 精解Windows 8
- 開源安全運維平臺OSSIM疑難解析:入門篇
- SharePoint 2013 WCM Advanced Cookbook
- Linux操作系統應用編程
- 網絡操作系統教程:Windows Server 2016管理與配置
- Linux使用和管理指南:從云原生到可觀測性
- 完美應用RHEL 8
- INSTANT Migration from Windows Server 2008 and 2008 R2 to 2012 How-to
- ElasticSearch Cookbook
- Agile IT Security Implementation Methodology
- Office 365 User Guide