Penetration testing tools for information systems

Download article in PDF format

Authors: Tumanov S. A.

Annotation: Penetration testing has a various vectors of attack. The auditor should not miss potential ways of penetration. In the article we consider the methodology of creating scenarios of penetration testing, which denotes the sequence of actions of the auditor. The tester should perform this methodology for the best result.

Keywords: penetration testing, reconnaissance, footprinting, information security audit

Editorial office address

Executive Secretary of the Editor’s Office

 Editor’s Office: 40 Lenina Prospect, Tomsk, 634050, Russia

  Phone / Fax: + 7 (3822) 701-582

  journal@tusur.ru

 

Viktor N. Maslennikov

Executive Secretary of the Editor’s Office

 Editor’s Office: 40 Lenina Prospect, Tomsk, 634050, Russia

  Phone / Fax: + 7 (3822) 51-21-21 / 51-43-02

  vnmas@tusur.ru

Subscription for updates