Results 91 to 100 of about 1,899 (129)

SCWAD: Automated Pentesting of Web Applications

open access: yesProceedings of the 21st International Conference on Security and Cryptography
A wide array of techniques and tools can be employed for web application security assessment. Some methods, such as fuzzers and scanners, are partially or fully automated, offering speed and cost-effectiveness. However, these tools often fall short in detecting specific vulnerabilities like broken access control and are prone to generating false ...
Talon, Natan   +4 more
exaly   +3 more sources
Some of the next articles are maybe not open access.

Related searches:

Performing an IoT Pentest

2019
In this chapter, we learn how to perform an IoT pentest and understand the first element of it, which is attack surface mapping. A lot of pentesters have not yet been able to move to IoT penetration testing because of the lack of knowledge of how to perform an IoT pentest: What are the different components involved? What tools should be used?
openaire   +1 more source

A ÉTICA NO CENÁRIO DE PENTESTS.

Revista ft
With the constant increase in news about cyber attacks, interest in the topic is also growing, especially in relation to data protection measures. Some individuals try to alert companies about possible thefts and leaks, but illegally. These attacks, commonly carried out by people known as hackers, leave organizations vulnerable.
Livia Onofre, Carla Aguiar
openaire   +1 more source

The Pentester Blueprint

2020
Phillip Wylie, Kim Crawley
openaire   +1 more source

Scientific Literature Review for the Search of Vulnerabilities and Pentesting Tools for SCADA System

Communications in Computer and Information Science, 2021
Eduardo Vásquez, Helder Castrillón
exaly  

CUPID: A labeled dataset with Pentesting for evaluation of network intrusion detection

Journal of Systems Architecture, 2022
Uchenna Ezeobi   +2 more
exaly  

Home - About - Disclaimer - Privacy