- Penetration Testing with BackBox
- Stefan Umit Uygur
- 168字
- 2021-07-19 18:18:52
What this book covers
Chapter 1, Starting Out with BackBox Linux, introduces BackBox Linux and the organization of the tools and services with a brief description of the tools included.
Chapter 2, Information Gathering, introduces us to a few ways of collecting useful information about the target system.
Chapter 3, Vulnerability Assessment and Management, explains how to perform vulnerability scans.
Chapter 4, Exploitations, uses the information we have collected in the previous chapters.
Chapter 5, Eavesdropping and Privilege Escalation, helps us in performing eavesdropping and privilege escalation on the target system where we already gained access by having obtained the access credentials in the previous chapter.
Chapter 6, Maintaining Access, helps us to set up backdoors in order to maintain access without repeating the steps covered in the previous chapters.
Chapter 7, Penetration Testing Methodologies with BackBox, helps us to perform a complete penetration test step-by-step, starting from information gathering to gaining access.
Chapter 8, Documentation and Reporting, explains how to create human-readable reports of our auditing tasks.
- HBase不睡覺書
- 深度實踐微服務(wù)測試
- 浴缸里的驚嘆:256道讓你恍然大悟的趣題
- 大數(shù)據(jù)安全
- 矛與盾:黑客就這幾招
- P2P網(wǎng)絡(luò)測量與分析
- CSS3網(wǎng)頁設(shè)計從入門到精通(微課精編版)
- pfSense 2.x Cookbook
- UG NX 12.0數(shù)控編程與加工案例教程
- 云計算基礎(chǔ)教程(第2版)
- 網(wǎng)絡(luò)基礎(chǔ)
- 綜合布線實訓(xùn)教程(第2版)
- 智慧網(wǎng)絡(luò)協(xié)同組織機(jī)理
- 撥得云開見日出:解構(gòu)一個典型的云計算系統(tǒng)
- Nutanix超融合基礎(chǔ)架構(gòu)權(quán)威指南