
上QQ阅读APP看书,第一时间看更新
Section 2: Common Pentesting Tasks and Tools
In this section, we will learn how to gather, store, and process information. We'll also look at how to deploy payloads to a target and remove the fingerprints of a NetHunter attack.
The following chapters are in this section: