Penetration testing: Concepts, attack methods, and defense strategies

M Denis, C Zena, T Hayajneh - … Systems, Applications and …, 2016 - ieeexplore.ieee.org
… The same tools used to prevent attacks may also be used by others to gather data and
compromise large size companies. Usually, medium and big size companies are exercising …

[HTML][HTML] Overview and open issues on penetration test

D Dalalana Bertoglio, AF Zorzo - Journal of the Brazilian Computer Society, 2017 - Springer
… Therefore, the aim of this research is to provide foundation … a comprehensive analysis for
researchers, security analysts, … , the published research papers are on information security. …

[HTML][HTML] The simulated security assessment ecosystem: Does penetration testing need standardisation?

W Knowles, A Baron, T McGarr - Computers & Security, 2016 - Elsevier
… attempts to test an organisation's cyber security capabilities against … The overall aim of the
research was to assess the need for … the first comprehensive analysis of the simulated security

Security testing: A survey

M Felderer, M Büchler, M Johns, AD Brucker… - Advances in …, 2016 - Elsevier
… created during development, (3) penetration testing and … provides a comprehensive survey
on security testing and is … , whereas nonfunctional testing aims at assessing nonfunctional …

Vulnerability assessment and penetration testing of web application

S Nagpure, S Kurkure - … , Communication, Control and …, 2017 - ieeexplore.ieee.org
… a comprehensive security analysis of a web application. … Consider the example in which the
attacker aims to pop-up an … in case cyber security vulnerability assessment and penetration

Web Application Penetration Test: Proposal for a Generic Web Application Testing Methodology

HP João - 2021 - search.proquest.com
… The meetings and conversations were vital to form a comprehensive and objective critique
aim is to prevent unauthorized identities from accessing classified information and using it …

Towards an efficient automation of network penetration testing using model-based reinforcement learning

MC Ghanem - 2022 - openaccess.city.ac.uk
cyber security, artificial intelligence, and machine learning. … of the possible attacks that aim
to exploit its vulnerabilities. In … representation of PT on large networks, we propose thus a …

[PDF][PDF] Penetration testing using Linux tools: attacks and defense strategies

V Santhi, DKR Kumar, BLVV Kumar - Int. J. Eng. Res. Technol, 2016 - academia.edu
… is to demonstrate about penetration testing methodology and the … The methodology used
for penetration testing is introduced in … “Aiming at Higher Network Security Through Extensive

Security Analysis of VoIP Networks Through Penetration Testing

PA Ochang, P Irving - Information and Software Technologies: 23rd …, 2017 - Springer
… a comprehensive VoIP network security level can be attained by carrying out penetration tests
through … strategy with the aim of compromising the 3CX IP PBX and the User Agents. The …

Guidelines for white box penetration testing wired devices in secure network environments

D Le Vandolph - 2023 - diva-portal.org
… There are several large and established frameworks for doing so, and they … large systems
with multiple endpoints, devices, and network layers. The majority of new penetration testing