Penetration TestingPenetration testing, also called pen testing or ethical hacking, is the practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit. |
What people are saying - Write a review
We haven't found any reviews in the usual places.
Contents
Section 17 | |
Section 18 | |
Section 19 | |
Section 20 | |
Section 21 | |
Section 22 | |
Section 23 | |
Section 24 | |
Section 9 | |
Section 10 | |
Section 11 | |
Section 12 | |
Section 13 | |
Section 14 | |
Section 15 | |
Section 16 | |
Section 25 | |
Section 26 | |
Section 27 | |
Section 28 | |
Section 29 | |
Section 30 | |
Section 31 | |
Other editions - View all
Common terms and phrases
able active allows application ARP poisoning attack backdoor called command communication connection contains created database DDoS attack detect devices Discovered discuss domain name enter enumeration example executed exploit flood following screenshot gain access gather going Google hack hijack host important injection installed IP address Kali keep language Linux look machine malicious manage means Metasploit Meterpreter nmap Once operating system options packets password payload penetration testing perform person ping points port possible preceding screenshot protection Protocol provider records request result Scanning script server session shown sniffing spoofing Step stored subdomain target computer target machine terminal tool traffic update Veil victim vulnerabilities Windows wireless