Proceedings of the 2004 Winter Simulation Conference, 2004.
DOI: 10.1109/wsc.2004.1371331
|View full text |Cite
|
Sign up to set email alerts
|

Fast Model-Based Penetration Testing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 4 publications
0
7
0
Order By: Relevance
“…This will open a backdoor. Whenever we wish to access that system no entrance fee is required [6]. When it buzz for password, press Shift Key 5 times, you will get an instance of explorer.exe and machine is being compromised.…”
Section: Methodsmentioning
confidence: 99%
“…This will open a backdoor. Whenever we wish to access that system no entrance fee is required [6]. When it buzz for password, press Shift Key 5 times, you will get an instance of explorer.exe and machine is being compromised.…”
Section: Methodsmentioning
confidence: 99%
“…This will create a backdoor. Whenever we access that system no authentication process required [6]. Press Shift Key 5 times when it asks for password, you will get an instance of explorer.exe and machine is being compromised.…”
Section: Meterpretermentioning
confidence: 99%
“…Singh et al [12] have divided the security quantification methods into penetration testing and analysis of formal models of the system. They have proposed a new approach to quantify security by performing repeated penetration testing of a detailed system model.…”
Section: Related Workmentioning
confidence: 99%