Exploitation

From The Penetration Testing Execution Standard
Revision as of 11:24, 2 March 2011 by Iamit (talk | contribs) (Created page with "This section describes the methodology and issues that the exploitation phase should cover.<br /> Following is an image depicting the main branches of the corresponding mindmap:<...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

This section describes the methodology and issues that the exploitation phase should cover.
Following is an image depicting the main branches of the corresponding mindmap:
Exploitation.png