渗透入侵测试方案
1.布景介绍32.模拟渗/透侵/入技术简介33.企业网络环境34.模拟渗/透侵/入技术实施方法64.1?依据测试者掌握信息多少分类64.2?依据测试者位置分类65.渗/透测试模型75.1?系统架构设计75.2??过程设计75.3模型关键技术86.渗/透测试触及的技术96.1.预攻击期间96.2.攻击期间106.3.后攻击期间106.4.攻击途径116.4.1.内网测试116.4.2.外网测试116.4.3.不一样网段/Vlan之间的渗/透116.5.信息收集技术117.时刻组织12模拟渗/透侵/入测试方案.pdf
本资源由开源阁IT资料站收集。
(1. Background introduction 32. Introduction to simulated infiltration/infiltration/intrusion technology 33. Enterprise network environment 34. Implementation method of simulated infiltration/infiltration/intrusion technology 64.1? Classification according to how much information the tester has 64.2? Classification according to the location of the tester 65. Penetration / Penetration Testing Model 75.1? System Architecture Design 75.2? Process Design 75.3 Model Key Technologies 86. Technologies Touched by Penetration / Penetration Testing 96.1. Pre-attack Period 96.2. Attack Period 106.3. Post-attack Period 106.4. Intranet test 116.4.2. External network test 116.4.3. Infiltration/penetration between different network segments/Vlans 116.5. Information collection technology 117. Moment organization 12
Simulated Penetration / Penetration / Intrusion Test Scheme.pdf
This resource is collected by the Open Source Pavilion IT Information Station.)
页:
[1]