- Advanced Infrastructure Penetration Testing
- Chiheb Chebbi
- 73字
- 2021-06-24 19:12:58
Advanced Linux Exploitation
Now that we have a clear understanding of the different penetration testing methodologies, phases, and requirements, the game is just starting. It is time to buckle your seat belt because, in this chapter, you will dive into securing the Linux environment, from a high-level overview of Linux infrastructure penetration testing, to discovering the dark depths of kernel vulnerabilities. This chapter outlines the skills and tools required to bulletproof Linux infrastructures.
推薦閱讀
- Mastering vRealize Operations Manager(Second Edition)
- Windows Vista基礎與應用精品教程
- Linux系統架構與運維實戰
- Mobile-first Bootstrap
- 玩到極致 iPhone 4S完全攻略
- 高性能Linux服務器構建實戰:運維監控、性能調優與集群應用
- 精解Windows8
- Linux內核觀測技術BPF
- Kali Linux高級滲透測試
- Distributed Computing with Go
- Python UNIX和Linux系統管理指南
- Agile IT Security Implementation Methodology
- CSS揭秘
- 鴻蒙入門:HarmonyOS應用開發
- 鴻蒙HarmonyOS應用開發入門