2017 12th International Conference for Internet Technology and Secured Transactions (ICITST) 2017
DOI: 10.23919/icitst.2017.8356437
|View full text |Cite
|
Sign up to set email alerts
|

Automation of cyber-reconnaissance: A Java-based open source tool for information gathering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0
1

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
2
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 2 publications
0
1
0
1
Order By: Relevance
“…Dari 88 juta serangan tersebut, 43% tergolong serangan tipe pencurian informasi (Information Gathering) [1]. Information Gathering merupakan kegiatan mengumpulkan informasi sebanyak-banyaknya mengenai suatu sasaran tertentu [2]. Pada penelitian [3] Jeon, dkk.…”
Section: Pendahuluanunclassified
“…Dari 88 juta serangan tersebut, 43% tergolong serangan tipe pencurian informasi (Information Gathering) [1]. Information Gathering merupakan kegiatan mengumpulkan informasi sebanyak-banyaknya mengenai suatu sasaran tertentu [2]. Pada penelitian [3] Jeon, dkk.…”
Section: Pendahuluanunclassified
“…Roy et al [11] presents a practice for Pentest that uses the Google search engine, to nd vulnerabilities in internet pages only using speci c strings, that is, only using a certain set of characters that may or may not be composed by advanced Google operators. This string used in Google to search for vulnerabilities is called Dork, while the practice for Pentest that uses Google and Dorks is called Google Hacking (GH) or Google Dorking.…”
Section: Google Hackingmentioning
confidence: 99%