• Mastering Kali Linux for Advanced Penetration Testing
  • Robert W. Beggs
  • 35字
  • 2025-02-20 10:14:43

Part 1. The Attacker's Kill Chain

Starting with Kali Linux

Identifying the Target – Passive Reconnaissance

Active Reconnaissance and Vulnerability Scanning

Exploit

Post Exploit – Action on the Objective

Post Exploit – Persistence

本周热推:
黑客攻防从入门到精通(Web技术实战篇)0day安全Web漏洞搜索黑客攻防入门计算机网络安全原理
上一章目录下一章