Mastering Kali Linux for Advanced Penetration Testing
上QQ阅读APP看书,第一时间看更新
上一章目录下一章

Part 1. The Attacker's Kill Chain

Starting with Kali Linux

Identifying the Target – Passive Reconnaissance

Active Reconnaissance and Vulnerability Scanning

Exploit

Post Exploit – Action on the Objective

Post Exploit – Persistence

本周热推:
Microsoft Forefront Identity Manager 2010 R2 HandbookMastering Kali Linux for Advanced Penetration TestingMastering MetasploitNmap 6:Network exploration and security auditing CookbookImplementing AppFog
上一章目录下一章