Automated port scanning and security testing on a single network host

Black-box security testing is divided into five phases: reconnaissance, scanning, exploitation, post exploitation and reporting. There are many tools and methods to perform security testing in the exploitation and post-exploitation phases. Therefore, the first two steps are crucial to execute proper...

Full description

Bibliographic Details
Main Author: Keski-Korsu, P. (Pasi)
Format: Dissertation
Language:English
Published: University of Oulu 2016
Subjects:
Online Access:http://urn.fi/URN:NBN:fi:oulu-201605051652
http://nbn-resolving.de/urn:nbn:fi:oulu-201605051652