- Penetration Testing with BackBox
- Stefan Umit Uygur
- 168字
- 2021-07-19 18:18:52
What this book covers
Chapter 1, Starting Out with BackBox Linux, introduces BackBox Linux and the organization of the tools and services with a brief description of the tools included.
Chapter 2, Information Gathering, introduces us to a few ways of collecting useful information about the target system.
Chapter 3, Vulnerability Assessment and Management, explains how to perform vulnerability scans.
Chapter 4, Exploitations, uses the information we have collected in the previous chapters.
Chapter 5, Eavesdropping and Privilege Escalation, helps us in performing eavesdropping and privilege escalation on the target system where we already gained access by having obtained the access credentials in the previous chapter.
Chapter 6, Maintaining Access, helps us to set up backdoors in order to maintain access without repeating the steps covered in the previous chapters.
Chapter 7, Penetration Testing Methodologies with BackBox, helps us to perform a complete penetration test step-by-step, starting from information gathering to gaining access.
Chapter 8, Documentation and Reporting, explains how to create human-readable reports of our auditing tasks.
- 計(jì)算機(jī)網(wǎng)絡(luò)基礎(chǔ)
- P2P網(wǎng)絡(luò)測(cè)量與分析
- PWA實(shí)戰(zhàn):面向下一代的Progressive Web APP
- 監(jiān)控平臺(tái)解密:IT系統(tǒng)風(fēng)險(xiǎn)感知和洞察
- Laravel入門與實(shí)戰(zhàn)(第2版):構(gòu)建主流PHP應(yīng)用開發(fā)框架
- 開源網(wǎng)絡(luò)模擬器ns-3:架構(gòu)與實(shí)踐
- Instant Edublogs
- 軟件定義網(wǎng)絡(luò)核心原理與應(yīng)用實(shí)踐
- 阿里云云原生架構(gòu)實(shí)踐
- INSTANT Migration to HTML5 and CSS3 How-to
- 萬億級(jí)流量轉(zhuǎn)發(fā):BFE核心技術(shù)與實(shí)現(xiàn)
- 虛擬網(wǎng)構(gòu)建及其應(yīng)用
- 新編信息檢索與利用(第四版)
- Learning Bing Maps API
- 基于Flex的WebGIS開發(fā)