2023
DOI: 10.3390/app13126986
|View full text |Cite
|
Sign up to set email alerts
|

A Systematic Literature Review on Penetration Testing in Networks: Future Research Directions

Mariam Alhamed,
M. M. Hafizur Rahman

Abstract: Given the widespread use of the internet at the individual, governmental, and nongovernmental levels, and the opportunities it offers, such as online shopping, security concerns may arise. Cyber criminals are responsible for stopping organizations’ access to internet, for stealing valuable and confidential data, and causing other damage. Therefore, the network must be protected and meet security requirements. Network penetration testing is a type of security assessment used to find risk areas and vulnerabiliti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(4 citation statements)
references
References 33 publications
0
4
0
Order By: Relevance
“…Existing reviews of Ethical Hacking tools typically focus on industry practitioner tools, with occasional consideration of research-informed tools. Many popular practitioner tools included in these reviews (e.g., [15,2,163,164]) are recurrent: Nmap, Metasploit Framework, OpenVAS/GVM, Nessus, Burp Suite, OWASP ZAP, SQLMap, BeEF, Nikto, W3AF, and others.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Existing reviews of Ethical Hacking tools typically focus on industry practitioner tools, with occasional consideration of research-informed tools. Many popular practitioner tools included in these reviews (e.g., [15,2,163,164]) are recurrent: Nmap, Metasploit Framework, OpenVAS/GVM, Nessus, Burp Suite, OWASP ZAP, SQLMap, BeEF, Nikto, W3AF, and others.…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, Alhamed et al [163] analyse around 20 mostly practitioner tools, with good coverage of network vulnerability and exploitation in particular. However, they consider existing research proposals for mitigating techniques.…”
Section: Related Workmentioning
confidence: 99%
“…Unlike conventional penetration testing that concentrates on assessing network, server, and web application security, Mobile Pen Testing is finely tuned to scrutinize the vulnerabilities specific to mobile applications and devices. Mobile technology's pervasive presence has made mobile devices prime targets for cyber threats, necessitating specialized security measures [1]. Mobile Pen Testing is precisely tailored for this purpose.…”
Section: Introductionmentioning
confidence: 99%
“…A WAV is defined as "a flaw in the application that stems from coding defects and causes severe damage to the application upon exploitation" [4]. To identify and mitigate vulnerabilities that may be exploited by attackers, a penetration testing method or ethical hacking is used [5]. The Open Web Application Security Project (OWASP) provides the standard for such penetration testing methodology to test web applications and could be used to evaluate the effectiveness of web vulnerability scanners [6,7].…”
Section: Introductionmentioning
confidence: 99%