- Advanced Infrastructure Penetration Testing
- Chiheb Chebbi
- 127字
- 2021-06-24 19:12:56
Pillaging
By definition, pillaging is gathering all possible information from the systems. Knowing where the data is located, for example, could help predict the pivoting techniques. To perform an effective penetration testing, you need to gather all, and not limited to, the following information, installed software and services:
- Printers shares and security services
- Database servers
- Directory servers
- Certificate authority services
- Code management servers
- Virtualization services
The exploitation of most of these services will be discussed in detail later in the following chapters.
推薦閱讀
- Linux運維之道(第3版)
- Mastering vRealize Operations Manager(Second Edition)
- Containerization with LXC
- 新手學電腦從入門到精通(Windows 10+Office 2016版)
- Linux使用和管理指南:從云原生到可觀測性
- VMware NSX Cookbook
- Windows Vista終極技巧金典
- Linux操作系統
- Ubuntu Linux操作系統實用教程
- Web Penetration Testing with Kali Linux(Third Edition)
- bash shell腳本編程經典實例(第2版)
- Android應用性能優化最佳實踐
- OpenStack Essentials(Second Edition)
- Windows 8完全自學手冊
- 15分鐘!畫出我的漫畫角色:賣萌篇