Typo: defence to defense
Defense is American English where as defence is British English. I'm changing it back to defense since this guide is written in American English.pull/19/head
parent
3876e3e8c8
commit
fefcbfc4c6
|
@ -54,7 +54,7 @@ If a system is not secured, then any attacker can disrupt or take authorized acc
|
|||
|
||||
## Want to become a penetration tester?
|
||||
|
||||
Know about risks on the internet and how they can be prevented is very useful. Especially as a developer. Web hacking and penetration testing is the v2.0 of self-defence! But does know about tools and how to use them is really all you need to become a pen tester? Surely not. A real penetration tester must be able to proceed rigorously and detect the weaknesses of an application. He must be able to identify the technology behind and test every single door that might be open to hackers.
|
||||
Know about risks on the internet and how they can be prevented is very useful. Especially as a developer. Web hacking and penetration testing is the v2.0 of self-defense! But does know about tools and how to use them is really all you need to become a pen tester? Surely not. A real penetration tester must be able to proceed rigorously and detect the weaknesses of an application. He must be able to identify the technology behind and test every single door that might be open to hackers.
|
||||
|
||||
This repository aim first to establish a reflection method on penetration testing and explain how to proceed to secure an application. And secondly, to regroup all kind of tools or resources pen testers need. **Be sure to know basics of programming languages and Internet security before learning pen testing.**
|
||||
|
||||
|
|
Loading…
Reference in New Issue