February 2018
Intermediate to advanced
396 pages
9h 38m
English
I n the previous chapter, we had the opportunity to learn how to attack and secure the Linux infrastructure. Now, it's time to expand our skills and gain the required knowledge and hands-on expertise for penetrating corporate networks and databases.
The topics that are covered in this chapter are:
Before getting in too deep, let's get started with some basics.