ISSN No: 2231-5063
Useful Links
Article Details ::
Article Name :
PENTEST - DOUBLE BLIND AND VULNERABILITY
Author Name :
Watila Ramos Grachet,Fabrício Moraes de Almeida
Publisher :
Ashok Yakkaldevi
Article Series No. :
GRT-3369
Article URL :
Author Profile    View PDF In browser
Abstract :
This article deals with information security, essential for proper operation of any computer system criteria, such as confidentiality, security and availability must be prioritized in any IT system. And it has a literature approach to information security, and then is treated on the types of pentest, some methods footprint and fingerprint. Then we present the techniques used primarily for intrusion servers. Therefore, it is necessary to perform tests to diagnose possible vulnerabilities and fix them before someone malicious explore it. The gathering of information, knowledge of the environment and familiarity with the techniques used in pentest are paramount, because from then, the chances of success are higher. The tools (software) for pentest will be the basis for the test to be applied in a practical and results in success. The Pentest is done to find a vulnerability or gap in the system and find out as much as possible vulnerability to invasion and other types of attacks such as session hijacking, buffer overflow, pichamento and so on. Therefore, the research is important, since the topic provides reflections on the prevention of simulations of the possibilities of performing virtual crimes.
Keywords :
Best Viewed in IE7+, Chrome, Mozilla Firefox. Copyright © 2012 lbp.world All rights reserved.