官术网_书友最值得收藏!

What this book covers

Chapter 1, Starting Out with BackBox Linux, introduces BackBox Linux and the organization of the tools and services with a brief description of the tools included.

Chapter 2, Information Gathering, introduces us to a few ways of collecting useful information about the target system.

Chapter 3, Vulnerability Assessment and Management, explains how to perform vulnerability scans.

Chapter 4, Exploitations, uses the information we have collected in the previous chapters.

Chapter 5, Eavesdropping and Privilege Escalation, helps us in performing eavesdropping and privilege escalation on the target system where we already gained access by having obtained the access credentials in the previous chapter.

Chapter 6, Maintaining Access, helps us to set up backdoors in order to maintain access without repeating the steps covered in the previous chapters.

Chapter 7, Penetration Testing Methodologies with BackBox, helps us to perform a complete penetration test step-by-step, starting from information gathering to gaining access.

Chapter 8, Documentation and Reporting, explains how to create human-readable reports of our auditing tasks.

主站蜘蛛池模板: 临夏市| 平阳县| 大连市| 长丰县| 宁武县| 乐平市| 托克逊县| 大宁县| 西青区| 华坪县| 阳东县| 龙海市| 南投县| 巫山县| 博爱县| 开鲁县| 农安县| 井陉县| 阳西县| 黎平县| 松江区| 丹棱县| 安义县| 灵台县| 许昌县| 丹寨县| 灯塔市| 鹤山市| 沙河市| 南部县| 昌平区| 阜阳市| 唐山市| 梁山县| 和平区| 怀来县| 乌兰察布市| 临高县| 班戈县| 车险| 丰镇市|