- Cybersecurity:Attack and Defense Strategies
- Yuri Diogenes Erdal Ozkaya
- 79字
- 2021-06-30 19:15:52
Scanning
In this subphase of reconaissance, an attacker will critically examine weak points identified in the reconnaissance phase. It involves the use of various scanning tools to find loopholes that can be exploited to stage an attack. Attackers take a considerable amount of time in this stage as they know that it determines a significant percentage of their success.
From the numerous available scanning tools, the ones presented in the sections that follow are the most commonly used ones.
推薦閱讀
- 電腦組裝與系統安裝
- 從零開始寫Linux內核:一書學透核心原理與實現
- WindowsServer2012Hyper-V虛擬化部署與管理指南
- 高性能Linux服務器構建實戰:系統安全、故障排查、自動化運維與集群架構
- Dreamweaver CS5.5 Mobile and Web Development with HTML5,CSS3,and jQuery
- 計算機系統:基于x86+Linux平臺
- 計算機系統的自主設計
- 寫給架構師的Linux實踐:設計并實現基于Linux的IT解決方案
- Introduction to R for Quantitative Finance
- Hands-On GPU Programming with Python and CUDA
- Linux應用大全 基礎與管理
- Hadoop Real-World Solutions Cookbook
- Linux內核API完全參考手冊(第2版)
- Linux操作系統案例教程(第2版)
- Learn OpenShift