- Advanced Infrastructure Penetration Testing
- Chiheb Chebbi
- 73字
- 2021-06-24 19:12:58
Advanced Linux Exploitation
Now that we have a clear understanding of the different penetration testing methodologies, phases, and requirements, the game is just starting. It is time to buckle your seat belt because, in this chapter, you will dive into securing the Linux environment, from a high-level overview of Linux infrastructure penetration testing, to discovering the dark depths of kernel vulnerabilities. This chapter outlines the skills and tools required to bulletproof Linux infrastructures.
推薦閱讀
- Citrix XenApp Performance Essentials
- 構建高可用Linux服務器(第4版)
- Extending Puppet
- 嵌入式實時操作系統:RT-Thread設計與實現
- OpenStack系統架構設計實戰
- Kali Linux高級滲透測試
- Hands-On UX Design for Developers
- Windows 10從新手到高手
- Heroku Cloud Application Development
- 從實踐中學習Windows滲透測試
- μC/OS-III內核實現與應用開發實戰指南:基于STM32
- OpenVZ Essentials
- OpenHarmony開發與實踐:基于紅莓RK2206開發板
- Mastering Azure Serverless Computing
- 再也不踩坑的kubernetes實戰指南