2013 International Conference on Information Communication and Embedded Systems (ICICES) 2013
DOI: 10.1109/icices.2013.6508375
|View full text |Cite
|
Sign up to set email alerts
|

A study of network security using penetration testing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 9 publications
0
4
0
Order By: Relevance
“…Xiong et al [83] proposed a web penetration framework using the grey-box approach which could be incorporated in SDLC but it does not help in securing android application during design and development. Denis et al [24] explained different methods, tools and techniques of penetration testing and performed tests on smartphones. The attack results showed that 14.6% issues were due to the lack of application security hardening.…”
Section: Ii-background and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Xiong et al [83] proposed a web penetration framework using the grey-box approach which could be incorporated in SDLC but it does not help in securing android application during design and development. Denis et al [24] explained different methods, tools and techniques of penetration testing and performed tests on smartphones. The attack results showed that 14.6% issues were due to the lack of application security hardening.…”
Section: Ii-background and Related Workmentioning
confidence: 99%
“…This type of hacking is considered legal because vulnerabilities are reported to the owner of the system so that improvements can be made to the system from a security point of view [40]. Deficiencies in the system network and applications can help the hackers in entering the system where they can damage the system [24]. The security and reliability (sr) of the application is dependent and directly proportional to the expertise (e) of the tester (sr ∝ e).…”
Section: Introductionmentioning
confidence: 99%
“…Once inside, the social engineer will influence the victim to accept an infected CD or USB drive. This infection might cause the victim's machine to steal the password (Shanmugapriya, 2013), files from the local computer, or becomes part of a botnet. In the next section, different SE attacks strategies and theories will be explored.…”
Section: Attack Approachesmentioning
confidence: 99%
“…In this process, the attacker will attempt to tailgate; by pretending to be a technician and persuade the victim to insert a USB drive with an infected keylogger. The social engineer makes the victim believe that the keylogger is some trusted application and makes him insert it (Shanmugapriya, 2013). The result of this option will lead to the Armament phase to prepare the attack payload and proceed forward in attack phases.…”
Section: The Practical Implementation Of Conceptual Attack Modelmentioning
confidence: 99%