Sökning: "Penetration testing"
Visar resultat 11 - 15 av 161 uppsatser innehållade orden Penetration testing.
11. Modeling and Simulation for Forward Arming and Refueling Points : Enhancing efficiency and Decision- making in Military Operations
Master-uppsats, FörsvarshögskolanSammanfattning : This master’s thesis explores the application of Modeling and Simulation (M&S) techniques in military operations involving Forward Arming and Refueling Points (FARP). FARPs play a crucial role in supporting aircraft operations by facilitating deep penetration into enemy territory and ensuring sustained presence in the Area of Operation (AOO). LÄS MER
12. Penetration testing of current smart thermostats : Threat modeling and security evaluation of Shelly TRV and Meross Smart Thermostat
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : As smart homes become increasingly common and concerns over Internet of Things (IoT) security grow, this study delves into the vulnerabilities of smart thermostats. These devices offer convenience but also comes with increased risk of cyber attacks. LÄS MER
13. Guidelines for white box penetration testing wired devices in secure network environments
Master-uppsats, Högskolan i Skövde/Institutionen för informationsteknologiSammanfattning : As technology is becoming a prevalent and ubiquitous part of society, increasing levels of cybercrime have drawn attention to the need for suitable frameworks for ensuring the security of systems by conducting penetration tests. There are several large and established frameworks for doing so, and they tend to focus on complicated large systems with multiple endpoints, devices, and network layers. LÄS MER
14. Säkerheten i webbapplikationer mot SQL- injektionsattacker : En studie av tekniker, säkerhetspåverkan och förekommande skyddslösningar
M1-uppsats, Blekinge Tekniska Högskola/Institutionen för programvaruteknikSammanfattning : Web applications constitute an essential part of our daily lives, providing us access to significant online services and information. Despite their advantages, they are also vulnerable to security threats, particularly SQL injection attacks. LÄS MER
15. Pentesting on a WiFi Adapter : Afirmware and driver security analysis of a WiFi Adapter, with a subset of WiFi pentesting
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Simple IoT devices such as WiFi adapters have the possibility of containing vulnerabilities because of the vast complexity of parsing and implementing the IEEE 802.11 standard correctly. LÄS MER