TAILIEUCHUNG - HACK PROOFING YOUR NETWORK INTERNET TRADECRAFT phần 4

Kể từ khi yêu cầu ban đầu thường là cho một người nào khác để làm điều đó cho họ, nó có thể là một giả định an toàn mà con số này nhỏ. Tuy nhiên, nếu họ được xác định, không có gì để ngăn chặn chúng từ việc học. Thế giới là cực kỳ may mắn là gần như tất cả các tin | 118 Chapter 4 Methodology For IT Professionals Tools About now you might be wondering whether these expensive tools are worth it. Should you invest in them If you have to ask the answer is probably no. I m never one to turn away toys if my employer wants to drop them in my lap however I won t insist on buying tools that I can t or won t use. Most of these tools are expensive because the market is small it takes a fairly skilled person to use them effectively. My advice is to do as much as you possibly can with the free or inexpensive tools before you even consider spending a lot of money on the professional tools. You may find that debugging decompiling doesn t suit you as a research method at all. You may find that the free stuff works just fine for you. Even if you do end up with one of the pro packages you ll have gathered enough experience to be able to pick the right one. Obtaining Creating a Duplicate Environment It has been mentioned in this chapter and will continue to be mentioned throughout this book that you should try to replicate the environment you want to attack. Of course that s easier said than done. Even if you re dealing with a free operating system that runs on commodity hardware there will still usually be significant time and disruption involved in configuring your lab to match the target environment. Of course if you find yourself trying to attack the features that are specific to say a Sun Ultra Enterprise E10000 you probably won t be able to afford to replicate that unless you re seriously funded. Some of the configurations of an E10000 can run hundreds of thousands of dollars or even over a million. Not to mention the lead time it takes to buy and install one of those. Wouldn t Sun be disappointed to learn that you just planned to return it when you were done How to Secure Against These Methodologies As we are discussing research methodologies there really isn t any form of protection against these types of attacks. All you can hope to do

TỪ KHÓA LIÊN QUAN
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.