Pentesting using Ethical Hacking techniques in IPv6 networks
Through this article the results of a research project are shown, carrying out a pentesting using ethical hacking techniques in networks implemented in the IP Protocol version 6 (IPv6), through a GNU / Linux security distribution tool IT, BackTrack, which is applied in the field of audits, facilitat...
Main Authors: | Jorge Armando Rojas Osorio, Yurley Constanza Medina Cardenas, Dewar Rico Bautista |
---|---|
Format: | Article |
Language: | English |
Published: |
Universidad Francisco de Paula Santander Ocaña
2016-12-01
|
Series: | Revista Ingenio |
Subjects: | |
Online Access: | https://revistas.ufps.edu.co/index.php/ingenio/article/view/2096/2044 |
Similar Items
-
IoT Pentesting: Obtaining the Firmware of a Smart Lock
by: Borg, Alexander, et al.
Published: (2020) -
Ethical Hacking
Published: (2019) -
Die ontwikkeling en implementering van 'n formele model vir logiese toegangsbeheer in rekenaarstelsels
by: Edwards, Norman Godfrey
Published: (2014) -
An access control model based on time and events
by: Jaggi, Felix P.
Published: (2010) -
Application of the access path model with specific reference to the SAP R/3 environment
by: Pretorius, Maria Rebecca
Published: (2014)