Useful Links |
|
Article Details :: |
|
Article Name : | | PENTEST - DOUBLE BLIND AND VULNERABILITY | Author Name : | | Watila Ramos Grachet,Fabrício Moraes de Almeida | Publisher : | | Ashok Yakkaldevi | Article Series No. : | | GRT-3369 | Article URL : | | | Author Profile View PDF In browser | Abstract : | | This article deals with information security, essential for proper operation of any computer system criteria, such as confidentiality, security and availability must be prioritized in any IT system. And it has a literature approach to information security, and then is treated on the types of pentest, some methods footprint and fingerprint. Then we present the techniques used primarily for intrusion servers. Therefore, it is necessary to perform tests to diagnose possible vulnerabilities and fix them before someone malicious explore it. The gathering of information, knowledge of the environment and familiarity with the techniques used in pentest are paramount, because from then, the chances of success are higher. The tools (software) for pentest will be the basis for the test to be applied in a practical and results in success. The Pentest is done to find a vulnerability or gap in the system and find out as much as possible vulnerability to invasion and other types of attacks such as session hijacking, buffer overflow, pichamento and so on. Therefore, the research is important, since the topic provides reflections on the prevention of simulations of the possibilities of performing virtual crimes. | Keywords : | | |
|
|