Engineering and Technology
Pages
Home
TECHNEWS
SEMINAR
Saturday, 28 September 2013
Penetration testing methodology
Information gathering
Network mapping
Vulnerability identification
Penetration
Gaining access and escalation
Enumerating further
Compromising remote user/sites
Maintaining Access
Covering tracks
No comments:
Post a Comment
Newer Post
Older Post
Home
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment