- Advanced Infrastructure Penetration Testing
- Chiheb Chebbi
- 59字
- 2021-06-24 19:12:47
Gaining access
At this stage, the attacker already has what they need to launch their attack, including IP range, identified systems, services, user lists, security vulnerabilities, and flows. Now they only need to bypass security controls to gain access to the system, using several techniques such as password cracking, social engineering or privilege escalation, and gaining other user permissions.
推薦閱讀
- Kubernetes修煉手冊
- Windows Vista基礎與應用精品教程
- Linux運維實戰:CentOS7.6操作系統從入門到精通
- Learning Windows Server Containers
- 開源安全運維平臺OSSIM疑難解析:入門篇
- macOS效率手冊
- 嵌入式系統原理及開發
- VMware NSX Cookbook
- Windows 7應用入門與技巧
- Advanced TypeScript Programming Projects
- Hands-On UX Design for Developers
- Distributed Computing with Go
- 大學計算機應用基礎實踐教程(Windows 7+MS Office 2010)
- 大規模分布式系統架構與設計實戰
- VMware Horizon Mirage Essentials