Automated port scanning and security testing on a single network host
Black-box security testing is divided into five phases: reconnaissance, scanning, exploitation, post exploitation and reporting. There are many tools and methods to perform security testing in the exploitation and post-exploitation phases. Therefore, the first two steps are crucial to execute proper...
Main Author: | |
---|---|
Format: | Dissertation |
Language: | English |
Published: |
University of Oulu
2016
|
Subjects: | |
Online Access: | http://urn.fi/URN:NBN:fi:oulu-201605051652 http://nbn-resolving.de/urn:nbn:fi:oulu-201605051652 |