Analysis of Penetration Testing Tools
Abstract
Full Text:
PDFReferences
Georgia Weidman, Penetration Testing - A Hands-On Introduction To hacking, No Starch Press, 2014, isbn: 978-1-59327-564-8.
Rahmat Budiarto, Ramadass Sureswaran, Sureswaran Ramadass, Azman Samsudin, Salah Noor, Development of Penetration Ttesting Model for Increasing Network Security, Information and Communication Technologies: From Theory to Applications, 2004, isbn:0-7803-8482-2.
Stephen Fried, Introduction Tto Penetration Testing, Auerbach Publications, 2000.
Arpita Tewai, Arun Misra, Evaluation and Taxonomy of PenetrationTtesting, International Journal on Recent and Innovation Trends in Computing and Communication, vol: 3, no. 8, 2015, issn: 2321-8169.
Sumit Kumar, Sithu D. Sudarsan, An Innovative UDP Port Scanning Technique, International Journal of Future Computer and Communication , vol. 3, no. 6, 2014.
Monowar H. Bhuyan, D.K. Bhattacharyya, and J.K. Kalita, Surveying Port Scans and Their Detection Methodologies, The Computer Journal Advance Access, vol. 54 , no. 10, 2011.
Robert F. Erbacher, visual traffic monitoring and evaluation in proceedings of the conference on Internet Performance and Control of Network Systems II, pp 153–160, 2001.
G. F. Lyon, nmap network scanning: the official nmap project guide to network discovery and security scanning. Insecure, 2009.
Aileen G. Bacudio, Xiaohong Yuan, Bei-Tseng Bill Chu, Monique Jones, An Overview Of Penetration Testing, International Journal of Network Security & its Applications, vol. 3, no. 6, 2011.
Konstantinos Xynos, Iain Sutherland, Huw Read, Emlyn Everitt and Andrew J.C. Blyth, Penetration Testing And Vulnerability Assessments: A Professional Approach , International Cyber Resilience conference,2010.
Filip Holik, Josef Horalek, Ondrej Marik, Sona Neradova, Stanislav Zitta, Effective penetration testing with Metasploit framework and methodologies ,15th ieee International Symposium on Computational Intelligence and Informatics,2014.
Sheetal Bairwa, Bhawna Mewara and Jyoti Gajrani, Vulnerability Scanners: A Proactive Approach To Assess Web Application Security , International Journal on Computational Sciences & Applications, vol.4, no.1, 2014.
Cynthia Bailey Lee, Chris Roedel and Elena Silenok, Detection and Characterization of Port Scan Attacks, univeristy of california, department of computer science and engineering (2003).
Rajwinder Kaur, Gurjot singh, Analysing Port Scanning Tools and Security Techniques, International Journal of Electrical Electronics & Computer Science Engineering, vol. 1, issue 5, 2014, issn : 2348 2273.
Marri Rami Reddy, Dr. PrashanthYalla, Mathematical Analysis of Penetration Testing and Vulnerability Countermeasures, 2nd ieee International Conference on Engineering and Technology , 2016.
DOI: https://doi.org/10.23956/ijarcsse.v7i9.408
Refbacks
- There are currently no refbacks.