Overview and open issues on penetration test

D Dalalana Bertoglio, AF Zorzo - Journal of the Brazilian Computer Society, 2017 - Springer
Several studies regarding security testing for corporate environments, networks, and
systems were developed in the past years. Therefore, to understand how methodologies …

A comprehensive literature review of penetration testing & its applications

P Vats, M Mandot, A Gosain - 2020 8th International …, 2020 - ieeexplore.ieee.org
The PEN testing allows a PEN tester to check the functional aspects of a system that how
much a system is vulnerable to the Network security & intrusion attacks & to see its defense …

[图书][B] Professional penetration testing: Creating and learning in a hacking lab

T Wilhelm - 2013 - books.google.com
Professional Penetration Testing walks you through the entire process of setting up and
running a pen test lab. Penetration testing—the act of testing a computer network to find …

Manual and automated penetration testing. Benefits and drawbacks. Modern tendency

Y Stefinko, A Piskozub, R Banakh - 2016 13th international …, 2016 - ieeexplore.ieee.org
In this paper, we describe penetration testing, as a methodology for information security.
Pentesting is used for proactive defence and information systems protection. Special …

A survey on ethical hacking: issues and challenges

JPA Yaacoub, HN Noura, O Salman… - arXiv preprint arXiv …, 2021 - arxiv.org
Security attacks are growing in an exponential manner and their impact on existing systems
is seriously high and can lead to dangerous consequences. However, in order to reduce the …

Pentesting on web applications using ethical-hacking

REL De Jimenez - 2016 IEEE 36th Central American and …, 2016 - ieeexplore.ieee.org
Pentesting on web applications using ethical - hacking Page 1 Pentesting on Web Applications
using Ethical Hacking Rina Elizabeth Lopez de Jimenez Escuela de Computacion Itca-Fepade …

A Systematic Literature Review on Penetration Testing in Networks: Future Research Directions

M Alhamed, MMH Rahman - Applied Sciences, 2023 - mdpi.com
Given the widespread use of the internet at the individual, governmental, and
nongovernmental levels, and the opportunities it offers, such as online shopping, security …

Methodology for penetration testing

F Alisherov, F Sattarova - International Journal of Grid and Distributed …, 2009 - earticle.net
Penetration testing is one of the oldest methods for assessing the security of a computer
system. The idea behind penetration testing methodologies is that the penetration tester …

An overview of penetration testing

AG Bacudio, X Yuan, BTB Chu… - International Journal of …, 2011 - search.proquest.com
Penetration testing is a series of activities undertaken to identify and exploit security
vulnerabilities. It helps confirm the effectiveness or ineffectiveness of the security measures …

Selection of penetration testing methodologies: A comparison and evaluation

A Shanley, MN Johnstone - 2015 - ro.ecu.edu.au
Cyber security is fast becoming a strategic priority across both governments and private
organisations. With technology abundantly available, and the unbridled growth in the size …