Communications security

Typically, in communications security, the majority of the additional network devices come in place but with respect to Windows digitally signing the certificates and Service Principle Name (SPN) server, target name validation will be one of the notable things that penetration testers could utilize to develop a custom exploit. We will be exploring the exploitation of SPN in the next chapter.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
13.59.122.162