- Advanced Infrastructure Penetration Testing
- Chiheb Chebbi
- 127字
- 2021-06-24 19:12:56
Pillaging
By definition, pillaging is gathering all possible information from the systems. Knowing where the data is located, for example, could help predict the pivoting techniques. To perform an effective penetration testing, you need to gather all, and not limited to, the following information, installed software and services:
- Printers shares and security services
- Database servers
- Directory servers
- Certificate authority services
- Code management servers
- Virtualization services
The exploitation of most of these services will be discussed in detail later in the following chapters.
推薦閱讀
- 精解Windows 8
- 深入Linux內(nèi)核架構(gòu)與底層原理(第2版)
- Windows 7中文版從入門到精通(修訂版)
- 蘋果OS X Mavericks 10.9應(yīng)用大全
- Social Data Visualization with HTML5 and JavaScript
- Windows 8實(shí)戰(zhàn)從入門到精通(超值版)
- VMware Horizon View Essentials
- VMware Horizon Mirage Essentials
- Office 365 User Guide
- Learning IBM Watson Analytics
- Implementing Domain-Specific Languages with Xtext and Xtend(Second Edition)
- 鴻蒙HarmonyOS應(yīng)用開(kāi)發(fā)從入門到精通
- Windows 8玩全不求人
- Gradle Effective Implementations Guide(Second Edition)
- Linux從入門到精通