Mastering Kali Linux for Advanced Penetration Testing
上QQ阅读APP看书,第一时间看更新
上一章目录下一章

Part 1. The Attacker's Kill Chain

Starting with Kali Linux

Identifying the Target – Passive Reconnaissance

Active Reconnaissance and Vulnerability Scanning

Exploit

Post Exploit – Action on the Objective

Post Exploit – Persistence

本周热推:
SELinux System AdministrationLearning Pentesting for Android DevicesPython Penetration Testing CookbookMetasploit BootcampExtending Symfony2 Web Application Framework
上一章目录下一章