CEHv13 Notes – Module 03: Scanning Netowrks Lab
Scenario Earlier, you gathered all possible information about the target such as organization information (employee details, partner details, web links, etc.), network information (domains, sub-domains, sub sub-domains, IP addresses, network topology, etc.), and system information (OS details, user accounts, passwords, etc.). Now, as an ethical hacker, or as a penetration tester (hereafter, pen tester), your […]
共有 0 条评论