- Advanced Infrastructure Penetration Testing
- Chiheb Chebbi
- 113字
- 2021-06-24 19:12:55
Exploitation
By this stage, the penetration tester already has what he needs to launch his attack. Now he only needs to bypass security controls to gain access to the infrastructure system. During this phase, the penetration tester wears a black hat and tries to gain access to the infrastructure from a malicious hacker's perspective. After a good threat analysis, now it is time to exploit every vulnerability. In order to exploit these vulnerabilities, you can use a variety of automation tools and manual testing. The most famous exploitation tool is Metasploit, which is a must in every penetration tester's arsenal.

To explore the exploits, a user can use the show exploits command.
推薦閱讀
- Linux運維之道(第3版)
- 阿里云數字新基建系列:云原生操作系統Kubernetes
- 無蘋果不生活 OS X Mountain Lion隨身寶典
- 白話區塊鏈
- 構建可擴展分布式系統:方法與實踐
- Alfresco 4 Enterprise Content Management Implementation
- 嵌入式實時操作系統:RT-Thread設計與實現
- 網絡操作系統教程:Windows Server 2016管理與配置
- 蘋果OS X Mavericks 10.9應用大全
- Windows Server 2012網絡操作系統項目教程(第4版)
- Django Project Blueprints
- Ubuntu Linux操作系統實用教程
- OpenVZ Essentials
- Linux從入門到精通(視頻教學版)
- Linux系統安全:縱深防御、安全掃描與入侵檢測