September 2016
Intermediate to advanced
440 pages
7h 56m
English
"It's better to pay a cent for security than a dollar as a ransom" - Santosh Khadsare, cybercrime investigator | ||
| -- | ||
Let's now talk about testing various specialized services. It is likely that during our career as a penetration tester we will come across a company or a testable environment that only requires testing to be performed on a particular server, and this server may run services such as databases, VOIP, or SCADA. In this chapter, we will look at various developing strategies to use while carrying out penetration tests on these services. In this chapter, we will cover the following points:
Read now
Unlock full access