Читать книгу CompTIA Pentest+ Certification For Dummies - Glen E. Clarke - Страница 33
Information gathering and vulnerability identification
ОглавлениеThe second phase of the penetration testing process is the information gathering and vulnerability identification phase, which is also known in other pentest models as the “reconnaissance phase.” This phase can be broken into two subphases: information gathering as the first subphase, and vulnerability identification as the second subphase.