- Advanced Infrastructure Penetration Testing
- Chiheb Chebbi
- 50字
- 2021-06-24 19:12:56
Data exfiltration
During data exfiltration, the pentester maps all the exfiltration paths. The aim of this step is to make sure that there is no data leaving the organization in a sneaky way. Analyzing the data flow is of high priority, whereas data is the center of attention for hackers.
推薦閱讀
- Linux操作系統(tǒng)基礎(chǔ)
- Arch Linux Environment Setup How-to
- 開(kāi)源安全運(yùn)維平臺(tái)OSSIM疑難解析:入門篇
- 深入Linux內(nèi)核架構(gòu)與底層原理(第2版)
- 嵌入式Linux應(yīng)用開(kāi)發(fā)菜鳥進(jìn)階
- Microsoft Operations Management Suite Cookbook
- Joomla! 3 Template Essentials
- Mastering Reactive JavaScript
- Windows 7應(yīng)用入門與技巧
- Django Project Blueprints
- iOS 10 開(kāi)發(fā)指南
- Linux網(wǎng)絡(luò)操作系統(tǒng)項(xiàng)目教程(RHEL 7.4/CentOS 7.4)(第3版)(微課版)
- Office 365 User Guide
- Linux操作系統(tǒng)案例教程(第2版)
- VMware vSphere 5.1 Cookbook