The system will boot to the live disk instead of the local hard drive that’s if the machine is configured correctly the penetration tester will then have access to several of the resources on the local network, while at an equivalent time not leaving evidence on the local machine’s disk drive. Those with access to local machines on the network can leverage live disks to use these machines albeit the penetration tester doesn’t have an account on the installed OS.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |