Mastering Kali Linux for Advanced Penetration Testing
上QQ阅读APP看书,第一时间看更新
上一章目录下一章

Part 1. The Attacker's Kill Chain

Starting with Kali Linux

Identifying the Target – Passive Reconnaissance

Active Reconnaissance and Vulnerability Scanning

Exploit

Post Exploit – Action on the Objective

Post Exploit – Persistence

上一章目录下一章