2. 2 /12 ï½ ä½ãã«ä½¿ããããªã»ãã¥ãªãã£ãã¼ã«ãã¾ã¨ãã¾ããã ï½ ä½ãã«ä½¿ãããã ã£ãã使ã£ã¦ã¿ããã â»ã¡ã¸ã£ã¼ãªãã¼ã«ï¼Metasploit/Burp/OWASP/Hydra/Scapyçï¼ã¯é¤ãã ãã®è¾ºã¯Web Application Pentestã®è³æåç §ã 3. 3 /12 åå æ¦è¦ Spectrology ç»åãã¡ã¤ã«ãé³æ¥½ãã¡ã¤ã«ã«å¤æããPythonã®ã¹ãã¬ãã°ã©ãã£ãã¼ã«ã Github dorks Githubã«ããæ©å¯ãã¼ã¿ãæ¤ç´¢ããPythonã®ãã¼ã«ã Maltrail æªæã®ãããã©ãã£ãã¯æ¤åºã·ã¹ãã ã Yuki Chan æ§ã ãªãããã³ã°ãã¼ã«ã«ãã試é¨ãèªååãé¡ä¼¼ãã¼ã«ï¼Sn1perãFast-Track A2SV SSLã®æåãªèå¼±æ§ãèªåã¹ãã£ã³ããPythonã®ãã¼ã«ã Mr.SIP SIPåãã®æ»æãããPythonãã¼ã«ãSI
{{#tags}}- {{label}}
{{/tags}}