An Overview of Penetration Testing

被引:7
|
作者
Phong, Chiem Trieu [1 ]
Yan, Wei Qi [1 ]
机构
[1] Auckland Univ Technol, Auckland, New Zealand
关键词
Hackers; Information Security; Penetration Testing; Solutions; Vulnerability Assessment;
D O I
10.4018/ijdcf.2014100104
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Penetration testing is an effort to attack a system using similar techniques and tools adopted by real hackers. The ultimate goal of penetration testing is to call to light as many existing vulnerabilities as possible, then come up with practical solutions to remediate the problems; thus, enhance the system security as a whole. The paper introduces concepts and definitions related to penetration testing, together with different models and methodologies to conduct a penetration test. A wide range of penetration testing state-of-the-art, as well as related tools (both commercial and free open source available on the market) are also presented in relatively rich details.
引用
收藏
页码:50 / 74
页数:25
相关论文
共 50 条
  • [1] An overview of vulnerability assessment and penetration testing techniques
    Shah, Sugandh
    Mehtre, B. M.
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2015, 11 (01): : 27 - 49
  • [2] PENETRATION TESTING
    Aitkhozhayeva, Y. Zh.
    Ziro, A. A.
    Zhaibergenova, Zh. A.
    Baltabay, A. G.
    BULLETIN OF THE NATIONAL ACADEMY OF SCIENCES OF THE REPUBLIC OF KAZAKHSTAN, 2018, (06): : 39 - 44
  • [3] TISSUE PENETRATION OF ANTIBIOTICS - AN OVERVIEW
    SABATH, LD
    SCANDINAVIAN JOURNAL OF INFECTIOUS DISEASES, 1978, : 313 - 315
  • [4] Percutaneous penetration enhancers: An overview
    Thong, H.-Y.
    Zhai, H.
    Maibach, H. I.
    SKIN PHARMACOLOGY AND PHYSIOLOGY, 2007, 20 (06) : 272 - 282
  • [5] Network penetration testing
    He, LW
    Bode, N
    EC2ND 2005, PROCEEDINGS, 2006, : 3 - +
  • [6] About penetration testing
    Bishop, Matt
    IEEE SECURITY & PRIVACY, 2007, 5 (06) : 84 - 87
  • [7] Depth of Penetration testing
    James, B
    CERAMIC ARMOR MATERIALS BY DESIGN, 2002, 134 : 165 - 172
  • [8] Methodology for Penetration Testing
    Alisherov, Farkhod A.
    Sattarova, Feruza Y.
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2009, 2 (02): : 43 - 50
  • [9] Software penetration testing
    Arkin, B
    Stender, S
    McGraw, G
    IEEE SECURITY & PRIVACY, 2005, 3 (01) : 84 - 87
  • [10] Application penetration testing
    Thompson, HH
    IEEE SECURITY & PRIVACY, 2005, 3 (01) : 66 - 69