Results 81 to 90 of about 1,899 (129)
Dynamic report generation for Pentesting
Cyber-attacks are growing in both number and impact, so security teams need faster ways to analyse systems and share their findings. This master’s project adds a new scalable report generator to Huntdown, a service platform that offers a handy set of tools for pentesting.
openaire +1 more source
Introducing PenTest++:an AI-Augmented, Automated, Ethical Hacking System [PDF]
Al-Sinani, Haitham S, Mitchell, Chris J
core +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
The Pentest Method for Business Intelligence
2022 45th Jubilee International Convention on Information, Communication and Electronic Technology (MIPRO), 2022Information transactions and data retention comprise critical inputs to Business Intelligence processes. However, despite ongoing data-driven Business Intelligence process improvements, many companies only discover they are vulnerable to a cyber-attack after a breach materializes the risk.
Reddy, P. Soma, Pelletier, Justin
openaire +1 more source
Red Teams - Pentesters, APTs, or Neither [PDF]
In cybersecurity, red teams emulate real threats and launch attack operations to assess an organization’s security posture and provide experience to it’s defenders. Although red team engagements share similarities with penetration testing and vulnerability scanning, they differ significantly in terms of goals and purpose.
Kovačević, Ivan, Groš, Stjepan
openaire +2 more sources
Using quadrocopter as a pentest tool
Proceedings of the 6th International Conference on Security of Information and Networks, 2013This paper describes the creation of a prototype "small" unmanned aerial vehicle (UAV) for safety audit of information systems (pentest) [1, 2]. Such devices can seamlessly penetrate in closed facilities. It increases the chances compromising wireless networks available only in closed facilities. As base for the project was Parrot AR.Drone 2 and single-
Evgeny Sergeevich Abramov +2 more
openaire +1 more source
Pentest on Internet of Things Devices
2019 XLV Latin American Computing Conference (CLEI), 2019Internet of Things (IoT) is one of the key enabling technologies for an always-connected world and also a main enabler for generating information of interest in various application domains. A growing problem in recent years in this technology is security, as power-constrained devices that are typical of IoT applications may not always provide these ...
Cristoffer Leite +4 more
openaire +1 more source
Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, 2016
This Research Paper is a tour of my Penetration Testing automation tool Pentest Ninja which is a firefox extension which has come up with a new way of exploiting Cross Site Scripting and SQL Injection vulnerability and in this paper, I explain about the working and in depth of my tool, and explaining the way it works, though the tool itself it really ...
Kunal Relan, Vidushi Singhal
openaire +1 more source
This Research Paper is a tour of my Penetration Testing automation tool Pentest Ninja which is a firefox extension which has come up with a new way of exploiting Cross Site Scripting and SQL Injection vulnerability and in this paper, I explain about the working and in depth of my tool, and explaining the way it works, though the tool itself it really ...
Kunal Relan, Vidushi Singhal
openaire +1 more source
Cyber Security: A Peer-Reviewed Journal, 2023
Over the course of the last two years, we have seen cybercrime increase during the COVID-19 pandemic and beyond. But despite this increase, most organisations do not do enough pentesting to combat cyberattacks. This paper explores the practicalities and quality of pentesting at scale to help organisations understand the importance of implementing a ...
openaire +1 more source
Over the course of the last two years, we have seen cybercrime increase during the COVID-19 pandemic and beyond. But despite this increase, most organisations do not do enough pentesting to combat cyberattacks. This paper explores the practicalities and quality of pentesting at scale to help organisations understand the importance of implementing a ...
openaire +1 more source

