2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT) 2018
DOI: 10.1109/lisat.2018.8378035
|View full text |Cite
|
Sign up to set email alerts
|

A study on penetration testing process and tools

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
36
0
5

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
2
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 68 publications
(41 citation statements)
references
References 1 publication
0
36
0
5
Order By: Relevance
“…The OWASP pen-testing methodology [17] is followed to carry out the study. Figure 1 illustrates pen-testing processes step by step.…”
Section: Methodsmentioning
confidence: 99%
“…The OWASP pen-testing methodology [17] is followed to carry out the study. Figure 1 illustrates pen-testing processes step by step.…”
Section: Methodsmentioning
confidence: 99%
“…Risk assessment automation have been proposed in the form of automated penetration testing frameworks (e.g. [9], [10], [11], [12], [13], [14], [15], [16], [17], and [18]). These automated tools are excellent resources for identifying vulnerabilities.…”
Section: Risk Assessment Automationmentioning
confidence: 99%
“…Aktifitas peretasan sistem bukan berasal dari orang yang berada di luar organisasi saja, tetapi orang yang berada di dalam organisasi juga berpotensi melakukannya. Peretas biasanya menargetkan sistem informasi yang sudah mereka kenal dengan baik akses sebagai user [4]. User yang telah diberikan otorisasi untuk mengakses sistem, memiliki peluang yang besar untuk dapat meretas sistem tersebut.…”
Section: Pendahuluanunclassified