- Web Penetration Testing with Kali Linux(Third Edition)
- Gilberto Najera Gutierrez Juned Ahmed Ansari
- 187字
- 2021-06-24 18:44:50
Client IT team notifications
Penetration tests are also used as a means to check the readiness of the support staff in responding to incidents and intrusion attempts. You should discuss this with the client whether it is an announced or unannounced test. If it's an announced test, make sure that you inform the client of the time and date, as well as the source IP addresses from where the testing (attack) will be done, in order to avoid any real intrusion attempts being missed by their IT security team. If it's an unannounced test, discuss with the client what will happen if the test is blocked by an automated system or network administrator. Does the test end there, or do you continue testing? It all depends on the aim of the test, whether it's conducted to test the security of the infrastructure or to check the response of the network security and incident handling team. Even if you are conducting an unannounced test, make sure that someone in the escalation matrix knows about the time and date of the test. Web application penetration tests are usually announced.
- VMware Horizon View 6 Desktop Virtualization Cookbook
- PLC控制系統(tǒng)應(yīng)用與維護(hù)
- 嵌入式Linux驅(qū)動(dòng)程序和系統(tǒng)開(kāi)發(fā)實(shí)例精講
- 混沌工程:復(fù)雜系統(tǒng)韌性實(shí)現(xiàn)之道
- RHCSARHCE 紅帽Linux認(rèn)證學(xué)習(xí)指南(第7版)EX200 & EX300
- 分布式高可用架構(gòu)之道
- Kali Linux高級(jí)滲透測(cè)試(原書(shū)第3版)
- Learn CUDA Programming
- Office 365 User Guide
- Java EE 8 High Performance
- 操作系統(tǒng)之哲學(xué)原理第2版
- Windows Azure實(shí)戰(zhàn)
- iOS Programming Cookbook
- OpenStack Trove Essentials
- 跟老男孩學(xué)Linux運(yùn)維:Web集群實(shí)戰(zhàn)