-
Book Overview & Buying
-
Table Of Contents
Advanced Penetration Testing for Highly-Secured Environments, Second Edition - Second Edition
By :
To successfully penetrate a secured environment you must have a good understanding of what you are facing. The enumeration data gathered will assist in determining target prioritization. By the end of this chapter, you should be able to choose which targets are ideal candidates for your initial attacks. Certain attack types make more "noise" than others, thus a targeted attack will be less likely to be noticed. Thanks to the hard work of the open source community, we have a large selection of tools available to help us enumerate networks. In this chapter, we will discuss the following:
Some examples in this chapter take advantage of firewalls and IDS logs to allow the reader to understand...
Change the font size
Change margin width
Change background colour