METASPLOITDA POST-EXPLOITATION MODULLARIDA FOYDALANISH
;
Metasploit, post-exploitation, penetration testing, privilege escalation, payload, session, axborot xavfsizligi, tarmoq, ekspluatatsiyaAbstrak
Ushbu maqolada Metasploit Framework muhitida post-exploitation modullaridan foydalanishning nazariy va amaliy jihatlari yoritilgan. Tizimga dastlabki kirishdan so‘ng amalga oshiriladigan jarayonlar, ya’ni ma’lumot yig‘ish, foydalanuvchi huquqlarini oshirish, tizimni nazorat qilish va tarmoq ichida harakatlanish bosqichlari tahlil qilingan. Shuningdek, post-exploitation jarayonida qo‘llaniladigan asosiy modullar va ularning imkoniyatlari ko‘rib chiqilgan. Maqola axborot xavfsizligi sohasida bilimlarni kengaytirishga qaratilgan.
Iqtiboslar
Metasploit Unleashed — Offensive Security
Kennedy D., O’Gorman J., Kearns D., Aharoni M. — Metasploit: The Penetration Tester’s Guide
OWASP Testing Guide
Rapid7 Metasploit Documentation
NIST Cybersecurity Guidelines
EC-Council Ethical Hacking Materials
SANS Institute Security Resources
Offensive Security Training Materials
##submission.downloads##
Nashr qilingan
Nashr
Bo'lim
Iqtibos keltirish tartibi