2021 10th International Conference on System Modeling &Amp; Advancement in Research Trends (SMART) 2021
DOI: 10.1109/smart52563.2021.9676283
|View full text |Cite
|
Sign up to set email alerts
|

Penetration Testing Security Tools: A Comparison

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…In the work of Anand and Singh [13], penetration testing was done for Amazon Echo against a denial-of-service attack on the Kali Linux platform. They started the testing by assuming that the cyber criminals already have access to the home network.…”
Section: Literature Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…In the work of Anand and Singh [13], penetration testing was done for Amazon Echo against a denial-of-service attack on the Kali Linux platform. They started the testing by assuming that the cyber criminals already have access to the home network.…”
Section: Literature Surveymentioning
confidence: 99%
“…It is not an easy task, so the penetration tester uses automated tools to avoid that. In automated penetration testing, few tools are available as open-source, and some as commercial products with different functionalities [13]. The main problem in this automated penetration testing is in selecting the best tool.…”
Section: Introductionmentioning
confidence: 99%