February 2018
Intermediate to advanced
396 pages
9h 38m
English
After gathering a good amount of information on the target, the attacker has to scan it to reveal useful information about the system and use this information for the next phase (the gaining access phase). During this process, the attacker will look for different types of information, and for that, he will use different types of scanning.
Read now
Unlock full access