[go: up one dir, main page]

Kumar, 2023 - Google Patents

Penetration Testing Building Blocks

Kumar, 2023

Document ID
4531637102083510812
Author
Kumar A
Publication year
Publication venue
Perspectives on Ethical Hacking and Penetration Testing

External Links

Snippet

Penetration testing is an art, and the path of its mastery starts from having a good grasp on fundamental knowledge. Throughout this chapter, readers will be made familiar with the building blocks in an easy-to-interpret manner. During the course of this chapter, readers will …
Continue reading at www.igi-global.com (other versions)

Similar Documents

Publication Publication Date Title
Matic et al. Caronte: Detecting location leaks for deanonymizing tor hidden services
Singh et al. Detecting bot-infected machines using DNS fingerprinting
Giani et al. Data exfiltration and covert channels
Dutta et al. Cyber security: issues and current trends
Cigoj et al. An intelligent and automated WCMS vulnerability-discovery tool: the current state of the web
Hegarty et al. Digital evidence in fog computing systems
García et al. Large scale analysis of doh deployment on the internet
Thomchick et al. Application level security in a public library: A case study
Choi et al. Understanding internet of things malware by analyzing endpoints in their static artifacts
Pihelgas Back-tracing and Anonymity in Cyberspace
Yang et al. Network forensics in the era of artificial intelligence
Kumar Penetration Testing Building Blocks
Wangchuk et al. Opensource intelligence and dark web user de-anonymisation
Sondarva et al. Prevention to sensitive information disclosure via OSINT
Maleh Web application PenTesting: A comprehensive Guide for professionals
Mohammed et al. Visualization of DNS tunneling attacks using parallel coordinates technique
Safhi et al. Major security issue that facing social networks with its main defense strategies
Mohammed Network-based detection and prevention system against DNS-based attacks
Dahle Large scale vulnerability scanning
Muralidharan et al. Pyciuti: A python based customizable and flexible cybersecurity utility tool for penetration testing
Durmaz et al. Entering watch dogs: Evaluating privacy risks against large-scale facial search and data collection
Bayuk CyberForensics: understanding information security investigations
Wagenaar Detecting botnets using file system indicators
Dyson Blockchain Investigations-Beyond the ‘Money’
Gunawardana An Ethical Guide to Cyber Anonymity: Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments