Penetration testing tools for information systems
Download article in PDF format
Authors: Tumanov S. A.
Annotation: Penetration testing has a various vectors of attack. The auditor should not miss potential ways of penetration. In the article we consider the methodology of creating scenarios of penetration testing, which denotes the sequence of actions of the auditor. The tester should perform this methodology for the best result.
Keywords: penetration testing, reconnaissance, footprinting, information security audit