{"title":"现代渗透测试工具分析","authors":"T. Muzhanova","doi":"10.31673/2409-7292.2023.020005","DOIUrl":null,"url":null,"abstract":"Penetration testing is a security audit performed by an organization in which an expert attempts to find, penetrate, and exploit weaknesses in an organization's computer system or networks. The main goal is to find any potential weakness. It also helps organizations maintain and adhere to established standards for protecting the privacy of their customers. The article explores software tools that can be used to perform penetration testing.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Analysis of modern tools for penetration testing\",\"authors\":\"T. Muzhanova\",\"doi\":\"10.31673/2409-7292.2023.020005\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Penetration testing is a security audit performed by an organization in which an expert attempts to find, penetrate, and exploit weaknesses in an organization's computer system or networks. The main goal is to find any potential weakness. It also helps organizations maintain and adhere to established standards for protecting the privacy of their customers. The article explores software tools that can be used to perform penetration testing.\",\"PeriodicalId\":107068,\"journal\":{\"name\":\"Modern information security\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Modern information security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.31673/2409-7292.2023.020005\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Modern information security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31673/2409-7292.2023.020005","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Penetration testing is a security audit performed by an organization in which an expert attempts to find, penetrate, and exploit weaknesses in an organization's computer system or networks. The main goal is to find any potential weakness. It also helps organizations maintain and adhere to established standards for protecting the privacy of their customers. The article explores software tools that can be used to perform penetration testing.