Advertisement

Exploiting Vulnerabilities

  • Robert Svensson
Chapter

Abstract

What makes an excellent carpenter? The most obvious answer would, of course, be excellent craftsmanship. But without the right tools, not even the world’s greatest carpenter could make a decent table. The same is true for a security tester; she needs the right tools to carry out a decent security test. These tools are, most of the time, the very same tools that a hacker would use to try to force her way into a system.

Keywords

Security Tester Brute Force Attack Code Injection Injection Vulnerability Rainbow Table 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Copyright information

© Robert Svensson 2016

Authors and Affiliations

  • Robert Svensson
    • 1
  1. 1.BerlinGermany

Personalised recommendations