OSCP-PWK115 carded -2

On the third day of learning, I had not want to continue to learn, but think it is a day to adhere to.

A good result today, combing the knowledge of chapter 6, this is also easy to some of the previous foundation.


The third chapter is a passive search, mainly through public information


The fourth chapter is the active search, mainly grasp of foreign organizations that provide services and some information


The fifth chapter is a vulnerability scanner, it focuses on the use of NMAP and to OpenVAS vulnerability scanning


The sixth chapter is about the basic concepts buffer overflow was found in some of the concept is not very clear


Chapter VII is some of the concepts and methods of the following Windows buffer overflow exploit, very familiar with, is the focus of the next phase of


Chapter VIII are some of the concepts and methods of Linux following buffer overflow exploits, very familiar with, it is the focus of the next phase of

From this point of view carding six chapters, after a stage may be subject-oriented learning, including knowledge-based learning is not clear, there is no need to learn along

Guess you like

Origin www.cnblogs.com/tangjf10/p/12453024.html