beef_integration
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revision | Next revisionBoth sides next revision | ||
beef_integration [2019/04/02 15:11] – lucy | beef_integration [2019/04/02 15:11] – lucy | ||
---|---|---|---|
Line 4: | Line 4: | ||
By using techniques similar to common drive-by Malware, testers can assess the security of a target’s internal environment, | By using techniques similar to common drive-by Malware, testers can assess the security of a target’s internal environment, | ||
- | Unlike other security frameworks, Advanced Information Gathering looks past the hardened network perimeter and client system and examines exploitability within the context of the one open door: the web browser. | + | Unlike other security frameworks, Advanced Information Gathering looks past the hardened network perimeter and client system and examines exploitability within the context of the one open door: the web browser. |
beef_integration.txt · Last modified: 2019/07/25 12:49 by 127.0.0.1