- Cybersecurity:Attack and Defense Strategies
- Yuri Diogenes Erdal Ozkaya
- 79字
- 2021-06-30 19:15:52
Scanning
In this subphase of reconaissance, an attacker will critically examine weak points identified in the reconnaissance phase. It involves the use of various scanning tools to find loopholes that can be exploited to stage an attack. Attackers take a considerable amount of time in this stage as they know that it determines a significant percentage of their success.
From the numerous available scanning tools, the ones presented in the sections that follow are the most commonly used ones.
推薦閱讀
- Mastering ElasticSearch
- 開(kāi)源安全運(yùn)維平臺(tái)OSSIM疑難解析:入門篇
- 嵌入式Linux應(yīng)用開(kāi)發(fā)菜鳥(niǎo)進(jìn)階
- Windows Server 2012網(wǎng)絡(luò)操作系統(tǒng)企業(yè)應(yīng)用案例詳解
- Kali Linux 2018:Windows Penetration Testing
- Windows Server 2012網(wǎng)絡(luò)操作系統(tǒng)項(xiàng)目教程(第4版)
- 跟老男孩學(xué)Linux運(yùn)維:Shell編程實(shí)戰(zhàn)
- Learn CUDA Programming
- 鴻蒙操作系統(tǒng)設(shè)計(jì)原理與架構(gòu)
- Linux操作系統(tǒng)
- Android應(yīng)用性能優(yōu)化最佳實(shí)踐
- Learning IBM Watson Analytics
- 再也不踩坑的kubernetes實(shí)戰(zhàn)指南
- PrimeFaces Beginner's Guide
- 自研操作系統(tǒng):DIM-SUM設(shè)計(jì)與實(shí)現(xiàn)