官术网_书友最值得收藏!

Advanced Linux Exploitation

Now that we have a clear understanding of the different penetration testing methodologies, phases, and requirements, the game is just starting. It is time to buckle your seat belt because, in this chapter, you will dive into securing the Linux environment, from a high-level overview of Linux infrastructure penetration testing, to discovering the dark depths of kernel vulnerabilities. This chapter outlines the skills and tools required to bulletproof Linux infrastructures.

主站蜘蛛池模板: 鸡西市| 梅州市| 西宁市| 阿城市| 泰和县| 北安市| 临夏县| 五华县| 水城县| 绥中县| 开封市| 湘潭市| 宁都县| 太仆寺旗| 尖扎县| 龙州县| 肃南| 海伦市| 泽州县| 新田县| 白玉县| 花莲县| 藁城市| 武功县| 临夏市| 叙永县| 密云县| 顺平县| 徐汇区| 鄂托克前旗| 徐汇区| 安宁市| 百色市| 八宿县| 嘉兴市| 林周县| 清丰县| 西乌珠穆沁旗| 金寨县| 青海省| 沾化县|