官术网_书友最值得收藏!

What this book covers

Chapter 1, Starting Out with BackBox Linux, introduces BackBox Linux and the organization of the tools and services with a brief description of the tools included.

Chapter 2, Information Gathering, introduces us to a few ways of collecting useful information about the target system.

Chapter 3, Vulnerability Assessment and Management, explains how to perform vulnerability scans.

Chapter 4, Exploitations, uses the information we have collected in the previous chapters.

Chapter 5, Eavesdropping and Privilege Escalation, helps us in performing eavesdropping and privilege escalation on the target system where we already gained access by having obtained the access credentials in the previous chapter.

Chapter 6, Maintaining Access, helps us to set up backdoors in order to maintain access without repeating the steps covered in the previous chapters.

Chapter 7, Penetration Testing Methodologies with BackBox, helps us to perform a complete penetration test step-by-step, starting from information gathering to gaining access.

Chapter 8, Documentation and Reporting, explains how to create human-readable reports of our auditing tasks.

主站蜘蛛池模板: 长葛市| 应用必备| 枣庄市| 菏泽市| 娄底市| 阳春市| 南召县| 莆田市| 绥棱县| 五寨县| 呼图壁县| 兴山县| 焉耆| 卓资县| 伊宁县| 益阳市| 桐庐县| 盈江县| 新干县| 时尚| 昌都县| 邻水| 抚顺县| 佛坪县| 同江市| 望谟县| 庆阳市| 金溪县| 綦江县| 道真| 南京市| 高台县| 香河县| 泰和县| 定南县| 慈利县| 茂名市| 西充县| 吴忠市| 泽库县| 砚山县|