Home > other >  About the network intrusion
About the network intrusion

Time:09-19

Network intrusion steps, the main use of tools and their use?

CodePudding user response:

I won't, but I always feel that invasion of this kind of matter requires knowledge of not only must have the depth and scope, could not have a few reply can solve your problem,
The most important thing is that this sort of thing for my own use virtual machine build a test environment, please don't monkey around in a production environment, easy to put yourself into,

CodePudding user response:

reference 1st floor weixin_40290083 response:
although I can't, but I always feel that invasion of this kind of matter requires knowledge of not only must have the depth and breadth, could not have a few reply can solve your problem,
The most important thing is that this sort of thing for my own use virtual machine build a test environment, please don't monkey around in a production environment, easy to themselves into,

I I I'm not a bad person, it is a network security examination questions, baidu search less than, want to ask here you ~
  • Related