- Kali Linux Cookbook(Second Edition)
- Corey P. Schultz Bob Perciaccante
- 180字
- 2021-07-02 18:27:09
Vulnerable workstations
One of the many questions frequently asked is why we soften machines or use machines that have vulnerabilities. The fact is that a properly patched, properly configured, and properly hardened machine is quite difficult to get into. Penetration testing is not trying to get through to hardened devices but looking specifically for those devices that have vulnerabilities. In a typical engagement, you may find only one or two machines that have vulnerabilities. You can then use these machines to gain a foothold into an environment to compromise other more hardened machines. If you start doing regular engagements as a penetration tester, you will be surprised by just how many machines you may be able to find that have vulnerabilities. This is especially true with the proliferation of low cost Internet of Things (IoT) devices such as internet connected cameras, thermostats, automation systems, and monitoring. These devices often run Linux-type embedded operating systems and are rarely patched and often overlooked. More importantly, they are often riddled with bugs and vulnerabilities that we can use for our purposes.
- Mastering Visual Studio 2017
- 騰訊iOS測(cè)試實(shí)踐
- Mastering Entity Framework
- MariaDB High Performance
- Mastering LibGDX Game Development
- EPLAN實(shí)戰(zhàn)設(shè)計(jì)
- Linux:Embedded Development
- Python極簡(jiǎn)講義:一本書(shū)入門(mén)數(shù)據(jù)分析與機(jī)器學(xué)習(xí)
- SQL 經(jīng)典實(shí)例
- C++反匯編與逆向分析技術(shù)揭秘(第2版)
- Rust游戲開(kāi)發(fā)實(shí)戰(zhàn)
- jQuery從入門(mén)到精通(微課精編版)
- 金融商業(yè)數(shù)據(jù)分析:基于Python和SAS
- Managing Windows Servers with Chef
- 趣味掌控板編程