官术网_书友最值得收藏!

Advanced Linux Exploitation

Now that we have a clear understanding of the different penetration testing methodologies, phases, and requirements, the game is just starting. It is time to buckle your seat belt because, in this chapter, you will dive into securing the Linux environment, from a high-level overview of Linux infrastructure penetration testing, to discovering the dark depths of kernel vulnerabilities. This chapter outlines the skills and tools required to bulletproof Linux infrastructures.

主站蜘蛛池模板: 三原县| 紫云| 隆德县| 广丰县| 马尔康县| 广灵县| 巴里| 无锡市| 郑州市| 汝阳县| 夏邑县| 文昌市| 定结县| 宝兴县| 丰城市| 新河县| 吴忠市| 扶绥县| 东明县| 额尔古纳市| 澎湖县| 宁乡县| 新巴尔虎左旗| 梨树县| 内江市| 文成县| 石家庄市| 潮安县| 西乌珠穆沁旗| 开远市| 饶河县| 景德镇市| 韶关市| 潮州市| 内黄县| 清涧县| 天峻县| 昌宁县| 阿尔山市| 大悟县| 新丰县|