Читать книгу CompTIA Pentest+ Certification For Dummies - Glen E. Clarke - Страница 33

Information gathering and vulnerability identification

Оглавление

The second phase of the penetration testing process is the information gathering and vulnerability identification phase, which is also known in other pentest models as the “reconnaissance phase.” This phase can be broken into two subphases: information gathering as the first subphase, and vulnerability identification as the second subphase.

CompTIA Pentest+ Certification For Dummies

Подняться наверх