Kali Linux 2018:Assuring Security by Penetration Testing
上QQ阅读APP看书,第一时间看更新

Summary

This chapter introduced you to  the various methodologies in penetration testing for the purpose of planning and scoping the penetration test. The next chapter will take you through discovering and gathering information and data about targets and environments using both passive and active techniques.