Kumar, 2023 - Google Patents
Penetration Testing Building BlocksKumar, 2023
- Document ID
- 4531637102083510812
- Author
- Kumar A
- Publication year
- Publication venue
- Perspectives on Ethical Hacking and Penetration Testing
External Links
Snippet
Penetration testing is an art, and the path of its mastery starts from having a good grasp on fundamental knowledge. Throughout this chapter, readers will be made familiar with the building blocks in an easy-to-interpret manner. During the course of this chapter, readers will …
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Matic et al. | Caronte: Detecting location leaks for deanonymizing tor hidden services | |
Singh et al. | Detecting bot-infected machines using DNS fingerprinting | |
Giani et al. | Data exfiltration and covert channels | |
Dutta et al. | Cyber security: issues and current trends | |
Cigoj et al. | An intelligent and automated WCMS vulnerability-discovery tool: the current state of the web | |
Hegarty et al. | Digital evidence in fog computing systems | |
García et al. | Large scale analysis of doh deployment on the internet | |
Thomchick et al. | Application level security in a public library: A case study | |
Choi et al. | Understanding internet of things malware by analyzing endpoints in their static artifacts | |
Pihelgas | Back-tracing and Anonymity in Cyberspace | |
Yang et al. | Network forensics in the era of artificial intelligence | |
Kumar | Penetration Testing Building Blocks | |
Wangchuk et al. | Opensource intelligence and dark web user de-anonymisation | |
Sondarva et al. | Prevention to sensitive information disclosure via OSINT | |
Maleh | Web application PenTesting: A comprehensive Guide for professionals | |
Mohammed et al. | Visualization of DNS tunneling attacks using parallel coordinates technique | |
Safhi et al. | Major security issue that facing social networks with its main defense strategies | |
Mohammed | Network-based detection and prevention system against DNS-based attacks | |
Dahle | Large scale vulnerability scanning | |
Muralidharan et al. | Pyciuti: A python based customizable and flexible cybersecurity utility tool for penetration testing | |
Durmaz et al. | Entering watch dogs: Evaluating privacy risks against large-scale facial search and data collection | |
Bayuk | CyberForensics: understanding information security investigations | |
Wagenaar | Detecting botnets using file system indicators | |
Dyson | Blockchain Investigations-Beyond the ‘Money’ | |
Gunawardana | An Ethical Guide to Cyber Anonymity: Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments |