A study of penetration testing tools and approaches

作者: Trieu Phong Chiem

DOI:

关键词:

摘要:

参考文章(51)
O-Hoon Kwon, Seung Min Lee, Heejo Lee, Jong Kim, Sang Cheon Kim, Gun Woo Nam, Joong Gil Park, None, HackSim: An Automation of Penetration Testing for Remote Buffer Overflow Vulnerabilities Information Networking. Convergence in Broadband and Mobile Networking. ,vol. 3391, pp. 652- 661 ,(2005) , 10.1007/978-3-540-30582-8_68
Johnny Long, Justin Brown, Bill Gardner, Google Hacking for Penetration Testers ,(2004)
S. Lipner, The trustworthy computing security development lifecycle annual computer security applications conference. pp. 2- 13 ,(2004) , 10.1109/CSAC.2004.41
Bruno Legeard, Mark Utting, Practical Model-Based Testing: A Tools Approach ,(2006)
Paul M. Summitt, Mark Osborne, How to Cheat at Managing Information Security ,(2006)
Namdeo V. Kalyankar, Santosh D. Khamitkar, Gajanan D. Kurundkar, Nitin A. Naik, Penetration Testing: A Roadmap to Network Security arXiv: Networking and Internet Architecture. ,(2009)
Paul Asadoorian, Larry Pesce, Linksys WRT54G ultimate hacking ,(2007)
R. Budiarto, S. Ramadass, A. Samsudin, S. Noor, Development of penetration testing model for increasing network security international conference on information and communication technologies. pp. 563- 564 ,(2004) , 10.1109/ICTTA.2004.1307886