- Kali Linux:An Ethical Hacker's Cookbook
- Himanshu Sharma
- 47字
- 2021-07-08 09:41:17
Getting a list of subdomains
We don't always we have a situation where a client has defined a full detailed scope of what needs to be pentested. So we will use the following mentioned recipes to gather as much information as we can to perform a pentest.
推薦閱讀
- Vue.js 3.x快速入門
- Learning Java Functional Programming
- 高效微控制器C語言編程
- Learning RxJava
- 高級C/C++編譯技術(典藏版)
- 零基礎學Java程序設計
- Building an RPG with Unity 2018
- BeagleBone Black Cookbook
- Android群英傳
- 深度學習程序設計實戰
- 寫給青少年的人工智能(Python版·微課視頻版)
- Backbone.js Patterns and Best Practices
- 軟件再工程:優化現有軟件系統的方法與最佳實踐
- Visual FoxPro數據庫程序設計
- Mastering Citrix? XenDesktop?