Penetration testing: Concepts, attack methods, and defense strategies
M Denis, C Zena, T Hayajneh - … Systems, Applications and …, 2016 - ieeexplore.ieee.org
… The same tools used to prevent attacks may also be used by others to gather data and
compromise large size companies. Usually, medium and big size companies are exercising …
compromise large size companies. Usually, medium and big size companies are exercising …
[HTML][HTML] Overview and open issues on penetration test
D Dalalana Bertoglio, AF Zorzo - Journal of the Brazilian Computer Society, 2017 - Springer
… Therefore, the aim of this research is to provide foundation … a comprehensive analysis for
researchers, security analysts, … , the published research papers are on information security. …
researchers, security analysts, … , the published research papers are on information security. …
[HTML][HTML] The simulated security assessment ecosystem: Does penetration testing need standardisation?
… attempts to test an organisation's cyber security capabilities against … The overall aim of the
research was to assess the need for … the first comprehensive analysis of the simulated security …
research was to assess the need for … the first comprehensive analysis of the simulated security …
Security testing: A survey
… created during development, (3) penetration testing and … provides a comprehensive survey
on security testing and is … , whereas nonfunctional testing aims at assessing nonfunctional …
on security testing and is … , whereas nonfunctional testing aims at assessing nonfunctional …
Vulnerability assessment and penetration testing of web application
S Nagpure, S Kurkure - … , Communication, Control and …, 2017 - ieeexplore.ieee.org
… a comprehensive security analysis of a web application. … Consider the example in which the
attacker aims to pop-up an … in case cyber security vulnerability assessment and penetration …
attacker aims to pop-up an … in case cyber security vulnerability assessment and penetration …
Web Application Penetration Test: Proposal for a Generic Web Application Testing Methodology
HP João - 2021 - search.proquest.com
… The meetings and conversations were vital to form a comprehensive and objective critique
… aim is to prevent unauthorized identities from accessing classified information and using it …
… aim is to prevent unauthorized identities from accessing classified information and using it …
Towards an efficient automation of network penetration testing using model-based reinforcement learning
MC Ghanem - 2022 - openaccess.city.ac.uk
… cyber security, artificial intelligence, and machine learning. … of the possible attacks that aim
to exploit its vulnerabilities. In … representation of PT on large networks, we propose thus a …
to exploit its vulnerabilities. In … representation of PT on large networks, we propose thus a …
[PDF][PDF] Penetration testing using Linux tools: attacks and defense strategies
V Santhi, DKR Kumar, BLVV Kumar - Int. J. Eng. Res. Technol, 2016 - academia.edu
… is to demonstrate about penetration testing methodology and the … The methodology used
for penetration testing is introduced in … “Aiming at Higher Network Security Through Extensive …
for penetration testing is introduced in … “Aiming at Higher Network Security Through Extensive …
Security Analysis of VoIP Networks Through Penetration Testing
PA Ochang, P Irving - Information and Software Technologies: 23rd …, 2017 - Springer
… a comprehensive VoIP network security level can be attained by carrying out penetration tests
through … strategy with the aim of compromising the 3CX IP PBX and the User Agents. The …
through … strategy with the aim of compromising the 3CX IP PBX and the User Agents. The …
Guidelines for white box penetration testing wired devices in secure network environments
D Le Vandolph - 2023 - diva-portal.org
… There are several large and established frameworks for doing so, and they … large systems
with multiple endpoints, devices, and network layers. The majority of new penetration testing …
with multiple endpoints, devices, and network layers. The majority of new penetration testing …