官术网_书友最值得收藏!

Preface

The penetration testing technology today is riddled with oversimplified Graphical User Interfaces. Though easy to use, they often offer very little control over the operations they perform and don't offer a very informative experience to their users. Another drawback is that many of these security assessment solutions are only developed to identify and automate exploitation for the most obvious and unobfuscated instances of vulnerabilities. For every other practical instance of a vulnerability, penetration testers need to rely on their own scripts and assessment tools.

The basic skill set of a good penetration tester includes at least rudimentary skills in a scripting or software development languages such as bash scripting, Python, Go, Ruby, and so on. This is so that they can handle the weird and outlier instances of vulnerabilities with their own customized tools and are capable of automating security testing according to their own terms. Firewalls, intrusion detection/prevention systems, and other security monitoring solutions are becoming smarter, and the only way we, as penetration testers, are ever going to beat them is by learning to build our own tools to "weaponize" our command lines.

This book introduces some of the fundamental skills, tips, tricks, and command-line-driven utilities that the best penetration testers from all across the world use to ensure that they have as much control over their testing activities as possible. Anyone interested in introducing themselves to the command line specifically for penetration testing or penetration testing as a whole, will benefit from reading this book.

主站蜘蛛池模板: 江门市| 台前县| 张家川| 保靖县| 柳河县| 宁德市| 驻马店市| 江北区| 湘潭县| 虞城县| 长兴县| 社旗县| 平陆县| 五原县| 扶绥县| 云和县| 福海县| 翼城县| 蕉岭县| 万全县| 南丹县| 科技| 泸溪县| 晋江市| 祥云县| 敦化市| 民乐县| 涟水县| 宝清县| 南康市| 玛沁县| 应城市| 莱阳市| 法库县| 北海市| 呼和浩特市| 樟树市| 百色市| 清流县| 明水县| 克山县|