a job stcik from smth bbs today
来源:互联网 发布:知乎 羊绒大衣 编辑:程序博客网 时间:2024/05/17 06:34
I think the technology manager make a mistake on concept of "pentest". you can find below I describe .
pentest(penetrating test)
The job:
现在有这样一个兼职赚钱机会:
坐在家里,(经授权后)远程访问客户的网络资源,对其安全性进行测试;找出安全bug,并提出修补建议;最后写成一个《安全评估报告》给客户。
活是case by case, 报酬一活一结,十分优厚!
既能在家赚钱,又能提高自己的实用技术。
基本要求如下:
About the hacker testing (PenTest) requirement as follows,
1) Make a connection to services running on the public computer (the node address will be given once the service contract is established);
2) Gain unauthorised access to routers and other networking devices located behind the firewall (details can be provided at a later stage) by using system scanners, remote exploits and any common hackers techniques;
3) Probe the vulnerabilities of the firewall or of other networking devices (details to be provided) located behind the firewall.
4) Probe the vulnerabilities of the web servers including their web applications. The processes of transaction slips and Electronic Fund Transfer must be studied in detail.
5) Get packets through the firewall and into computers located behind the firewall; and
6) Determine the structure of the network(s) located behind the firewall.
M
also ,the above descriptions demands you to use many hacker ways to attack a host. never give the privilege if you do pentest.
A paper from my lab .
The Database Security Detection System we designed is based on thisobjective. The system consists of two important modules, so-called AuthorizationTest and Penetration Test. Penetration test is detection aimed at finding outvulnerabilities and improper configuration of DBMS with no privilege or lowprivilege, including Dictionary Attack Test, Buffer Overflow Attack Test,Deny-of-Service Attack Test.
pentest(penetrating test)
The job:
现在有这样一个兼职赚钱机会:
坐在家里,(经授权后)远程访问客户的网络资源,对其安全性进行测试;找出安全bug,并提出修补建议;最后写成一个《安全评估报告》给客户。
活是case by case, 报酬一活一结,十分优厚!
既能在家赚钱,又能提高自己的实用技术。
基本要求如下:
About the hacker testing (PenTest) requirement as follows,
1) Make a connection to services running on the public computer (the node address will be given once the service contract is established);
2) Gain unauthorised access to routers and other networking devices located behind the firewall (details can be provided at a later stage) by using system scanners, remote exploits and any common hackers techniques;
3) Probe the vulnerabilities of the firewall or of other networking devices (details to be provided) located behind the firewall.
4) Probe the vulnerabilities of the web servers including their web applications. The processes of transaction slips and Electronic Fund Transfer must be studied in detail.
5) Get packets through the firewall and into computers located behind the firewall; and
6) Determine the structure of the network(s) located behind the firewall.
M
also ,the above descriptions demands you to use many hacker ways to attack a host. never give the privilege if you do pentest.
A paper from my lab .
The Database Security Detection System we designed is based on thisobjective. The system consists of two important modules, so-called AuthorizationTest and Penetration Test. Penetration test is detection aimed at finding outvulnerabilities and improper configuration of DBMS with no privilege or lowprivilege, including Dictionary Attack Test, Buffer Overflow Attack Test,Deny-of-Service Attack Test.
- a job stcik from smth bbs today
- Tip of today-To take candy from a baby
- key to perl puzzles(from smth)
- Tranfer my blog from smth to here
- Begin from today
- OpenGL learn from today
- Start from today
- Submit a Spark job to YARN from Java Code
- Submit a Spark job to YARN from code
- Java5.0泛型编程 --from Smth
- 实变函数--from 水木清华 (www.smth.org)
- 同舟共济BBS的FB2000到smth的安装转化手册(一)
- from Today my programming life
- Today is a beginning
- Today is a Friday
- Today is a gift
- a job is a job
- 拓扑学 -- from BBS 水木清华站
- Windows2000+Apache2.0.47+Tomcat4.1.27+mod_jk_2.0.50+j2sdk1.4.2的整合配置方法
- CIO为什么说“不”采购篇(三)
- CIO为什么说“不”采购篇(四)
- 现代软件GUI构造及对策(一)
- 在.Net Framework1.1的环境下,调用TreeView控件,生成树图,点选父节点,则所有的子结点也选中,取消选中的父节点下的子结点,则父节点也取消选中状态。
- a job stcik from smth bbs today
- 网页中嵌入外部页面的四种方法
- 提高在google中排名计算方法
- Linux上配置JDK+TOMCAT+MYSQL
- [幽默笑话]聪明男人劝老婆
- 网页制作万花筒
- IIS建立新网站出错-另一个程序正在使用此文件,进程无法访问
- 在取得之前,要先学会付出
- 靠自己