{"title":"渗透测试安全工具:比较","authors":"Piyush Anand, Ajay Shankar Singh","doi":"10.1109/SMART52563.2021.9676283","DOIUrl":null,"url":null,"abstract":"Penetration testing (additionally referred as pen testing) is the exercise related to the checking out your PC framework, network or even internet based software aiming to discover vulnerabilities that the aggressor can likewise make the most. The main reason is constantly to peer how secure your very own machine can be or perhaps from the hacker’s point of view, exactly how confident your own machine is now. You have to be capable of look at almost all strategies which can be on the device, regardless of what computer or may be programming they work. This paper offers a top level view of equipment utilized in penetration testing.","PeriodicalId":356096,"journal":{"name":"2021 10th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Penetration Testing Security Tools: A Comparison\",\"authors\":\"Piyush Anand, Ajay Shankar Singh\",\"doi\":\"10.1109/SMART52563.2021.9676283\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Penetration testing (additionally referred as pen testing) is the exercise related to the checking out your PC framework, network or even internet based software aiming to discover vulnerabilities that the aggressor can likewise make the most. The main reason is constantly to peer how secure your very own machine can be or perhaps from the hacker’s point of view, exactly how confident your own machine is now. You have to be capable of look at almost all strategies which can be on the device, regardless of what computer or may be programming they work. This paper offers a top level view of equipment utilized in penetration testing.\",\"PeriodicalId\":356096,\"journal\":{\"name\":\"2021 10th International Conference on System Modeling & Advancement in Research Trends (SMART)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 10th International Conference on System Modeling & Advancement in Research Trends (SMART)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SMART52563.2021.9676283\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 10th International Conference on System Modeling & Advancement in Research Trends (SMART)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SMART52563.2021.9676283","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Penetration testing (additionally referred as pen testing) is the exercise related to the checking out your PC framework, network or even internet based software aiming to discover vulnerabilities that the aggressor can likewise make the most. The main reason is constantly to peer how secure your very own machine can be or perhaps from the hacker’s point of view, exactly how confident your own machine is now. You have to be capable of look at almost all strategies which can be on the device, regardless of what computer or may be programming they work. This paper offers a top level view of equipment utilized in penetration testing.