Essays about: "Penetration Tools"

Showing result 1 - 5 of 39 essays containing the words Penetration Tools.

  1. 1. Method to statistically secure field test results for rock drilling tools

    University essay from Uppsala universitet/Institutionen för materialvetenskap

    Author : Frida Olander; [2023]
    Keywords : Statistics; Probability; Hypothesis test; Linear regression;

    Abstract : The aim of this project is to find a statistical method that describes survival and outcome of a prototype drilling tool from several references and determine how many references are needed for a statistically secure result. The project also answers which variables that affects the outcome. READ MORE

  2. 2. Antivirus performance in detecting Metasploit payloads : A Case Study on Anti-Virus Effectiveness

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Eric Nyberg; Leandro Dinis Ferreira; [2023]
    Keywords : Metasploit; Anti-Virus Effectivness; AV Effectiveness; MSFVenom; Antivirus; AV Software; Metasploit Encoding; Encodings; Detection rates; AV Efficiency; Antivirus efficiency; payloads; payload detection..;

    Abstract : This paper will focus solely on the effectiveness of AV (antivirus) in detecting Metasploit payloads which have been encapsulated with different encapsulation modules. There seems to be a significant knowledge gap in the evaluation of commercial antivirus's software and their ability to detect malicious code and stop such code from being executed on IT systems. READ MORE

  3. 3. Guidelines for white box penetration testing wired devices in secure network environments

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Daniel Le Vandolph; [2023]
    Keywords : Penetration test; security assessment; white box; secure network; framework; methodology; guidelines;

    Abstract : As technology is becoming a prevalent and ubiquitous part of society, increasing levels of cybercrime have drawn attention to the need for suitable frameworks for ensuring the security of systems by conducting penetration tests. There are several large and established frameworks for doing so, and they tend to focus on complicated large systems with multiple endpoints, devices, and network layers. READ MORE

  4. 4. Is your camera spying on you? : A security evaluation of a smart camera

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Pontus Karlberg; [2023]
    Keywords : IoT; Security; Hacking; IoT; Säkerhet; Dataintrång;

    Abstract : There are billions of Internet of Things (IoT) devices deployed world wide. Despite this there have been numerous studies showing that these devices very often have major security vulnerabilities. Ensuring the security of IoT devices is important, but especially so for devices that handle sensitive data. READ MORE

  5. 5. Threat modelling and vulnerability assessment for IoT solutions: a case study

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Krasen Anatoliev Parvanov; Chrysostomos Tsagkidis; [2022-07-06]
    Keywords : Terms Threat Modelling; Internet of Things; IoT; Vulnerabilities; Vulnerability assessment; Penetration testing tools;

    Abstract : The cyber-security for Internet of Things (IoT) is of great importance for the future of the software industry, especially since the number of IoT devices rapidly increases. Therefore, it is important that practitioners consider threat modelling and vulnerability assessment in their software development process. READ MORE