Results 81 to 90 of about 1,899 (129)

Dynamic report generation for Pentesting

open access: yes
Cyber-attacks are growing in both number and impact, so security teams need faster ways to analyse systems and share their findings. This master’s project adds a new scalable report generator to Huntdown, a service platform that offers a handy set of tools for pentesting.
openaire   +1 more source
Some of the next articles are maybe not open access.

Related searches:

The Pentest Method for Business Intelligence

2022 45th Jubilee International Convention on Information, Communication and Electronic Technology (MIPRO), 2022
Information transactions and data retention comprise critical inputs to Business Intelligence processes. However, despite ongoing data-driven Business Intelligence process improvements, many companies only discover they are vulnerable to a cyber-attack after a breach materializes the risk.
Reddy, P. Soma, Pelletier, Justin
openaire   +1 more source

Red Teams - Pentesters, APTs, or Neither [PDF]

open access: possible2020 43rd International Convention on Information, Communication and Electronic Technology (MIPRO), 2020
In cybersecurity, red teams emulate real threats and launch attack operations to assess an organization’s security posture and provide experience to it’s defenders. Although red team engagements share similarities with penetration testing and vulnerability scanning, they differ significantly in terms of goals and purpose.
Kovačević, Ivan, Groš, Stjepan
openaire   +2 more sources

Using quadrocopter as a pentest tool

Proceedings of the 6th International Conference on Security of Information and Networks, 2013
This paper describes the creation of a prototype "small" unmanned aerial vehicle (UAV) for safety audit of information systems (pentest) [1, 2]. Such devices can seamlessly penetrate in closed facilities. It increases the chances compromising wireless networks available only in closed facilities. As base for the project was Parrot AR.Drone 2 and single-
Evgeny Sergeevich Abramov   +2 more
openaire   +1 more source

Pentest on Internet of Things Devices

2019 XLV Latin American Computing Conference (CLEI), 2019
Internet of Things (IoT) is one of the key enabling technologies for an always-connected world and also a main enabler for generating information of interest in various application domains. A growing problem in recent years in this technology is security, as power-constrained devices that are typical of IoT applications may not always provide these ...
Cristoffer Leite   +4 more
openaire   +1 more source

Pentest Ninja

Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, 2016
This Research Paper is a tour of my Penetration Testing automation tool Pentest Ninja which is a firefox extension which has come up with a new way of exploiting Cross Site Scripting and SQL Injection vulnerability and in this paper, I explain about the working and in depth of my tool, and explaining the way it works, though the tool itself it really ...
Kunal Relan, Vidushi Singhal
openaire   +1 more source

Exploring the practicalities and quality of pentesting at scale : Globally, pentest coverage is increasing but remains insufficient

Cyber Security: A Peer-Reviewed Journal, 2023
Over the course of the last two years, we have seen cybercrime increase during the COVID-19 pandemic and beyond. But despite this increase, most organisations do not do enough pentesting to combat cyberattacks. This paper explores the practicalities and quality of pentesting at scale to help organisations understand the importance of implementing a ...
openaire   +1 more source

Home - About - Disclaimer - Privacy