- Mastering Kali Linux for Advanced Penetration Testing
- Robert W. Beggs
- 105字
- 2021-07-16 11:33:21
Summary
The first real step in the attack process or kill chain is to conduct reconnaissance to identify the target and potential attack routes. Passive reconnaissance assesses data that is publicly available. This is a stealthy assessment—the IP address or activities of the attacker are almost indistinguishable from normal access. Nevertheless, this information can be critical when conducting social engineering attacks, or facilitating other attack types.
In the next chapter, we will assess the types of reconnaissance that are more active. Although these techniques produce more information, there is an increased risk of detection. Therefore, the emphasis will be on advanced stealth techniques.
推薦閱讀
- 工業互聯網安全防護與展望
- CSO進階之路:從安全工程師到首席安全官
- Mastering Kali Linux for Advanced Penetration Testing
- 計算機病毒原理與防范(第2版)
- 網絡運維親歷記 (網絡運維紀實文學)
- Digital Forensics with Kali Linux
- End to End GUI Development with Qt5
- 企業數據安全防護指南
- 功能型密碼算法設計與分析
- 信息系統安全等級化保護原理與實踐
- 聯邦學習原理與算法
- Web代碼安全漏洞深度剖析
- CPK通向賽博安全之路:理論與實踐CPK Solution to Cyber Security:Theory and Practice
- 計算機網絡安全與應用技術(第2版)
- 隱私計算與密碼學應用實踐