April 2020
Beginner
246 pages
4h 10m
English
In the previous chapter, we learned how to use tools such as NMAP and Nessus to directly exploit vulnerabilities in the target system. However, the techniques that we learned are only useful if the attacker's system and the target system are within the same network.
In this chapter, we'll look at an overview of the techniques used to exploit systems that are located in different networks altogether.
The topics to be covered in this chapter are as follows:
In the previous chapter, ...
Read now
Unlock full access