Limpar
94 resultados

Acesso aberto

Tipo do recurso

Ano de criação

Produção nacional

Revisado por pares

Áreas

Idioma

Editores

Artigo Acesso aberto Revisado por pares

Danar Cahyo Prakoso, Imam Riadi, Yudi Prayudi,

... information is confidential. Therefore, security is also essential. Metasploit is one of the frameworks commonly used by ... it does not rule out the possibility that Metasploit can also be used for crime. For this ... on Windows 10 will be carried out with Metasploit. Then the digital forensics process uses live forensics ...

Tópico(s): Security and Verification in Computing

2020 - Muhammadiyah University of Malang | Kinetik Game Technology Information System Computer Network Computing Electronics and Control

Artigo Acesso aberto

Indraneel Mukhopadhyay, Shilpam Goswami, Eshita Mandal,

... we have proposed a architecture using nesus and metasploit tool to do scan vulnerabilities of an website.

Tópico(s): Security and Verification in Computing

2014 - International Organization Of Scientific Research (IOSR) | IOSR Journal of Computer Engineering

Artigo

Metasploit is a favourite tool of people wearing white hats, black hats and every shade in between. ...

Tópico(s): Network Security and Intrusion Detection

2013 - Elsevier BV | Network Security

Artigo Acesso aberto Revisado por pares

Takeshi Okamoto,

... indicated that all samples of shellcode provided by Metasploit Framework, as well asthe 18 most recent attacks using Metasploit Framework, can be detected. Comparison of this method ...

Tópico(s): Network Security and Intrusion Detection

2015 - Elsevier BV | Procedia Computer Science

Artigo Acesso aberto

Monika Pangaria,

... pentest breach the Anti malware protection process.Using metasploit expoit ms08_067_netapi and meterpreter payload windows/ ...

Tópico(s): Advanced Malware Detection Techniques

2012 - International Organization Of Scientific Research (IOSR) | IOSR Journal of Computer Engineering

Artigo Acesso aberto

Abhishek Arote, Umakant Mandawkar,

... evaluating existing tools and exploits, and using the Metasploit framework for penetration testing and running exploits within ...

Tópico(s): Mobile and Web Applications

2021 - | International Journal of Scientific Research in Computer Science Engineering and Information Technology

Capítulo de livro Revisado por pares

Peter Teufl, Udo Payer, Guenter Lackner,

... the adopted framework to malicious code examples from Metasploit.

Tópico(s): Semantic Web and Ontologies

2010 - Springer Science+Business Media | Lecture notes in computer science

Artigo Revisado por pares

Deguang Kong, Donghai Tian, Qiha Pan, Peng Liu, Dinghao Wu,

... over a comprehensive set of shellcode collected from Metasploit and other polymorphic engines. Experimental results show that ...

Tópico(s): Spam and Phishing Detection

2012 - Hindawi Publishing Corporation | Security and Communication Networks

Artigo Revisado por pares

Miltiadis Kandias, Dimitris Gritzalis,

Tópico(s): Superconducting Materials and Applications

2012 - Elsevier BV | Computers & Security

Artigo Acesso aberto

Jarrod R. McClean, Christopher J. Stull, Charles R. Farrar, David Mascareñas,

... free cyber security penetration testing tools such as Metasploit?” This research focuses on applying common, low-cost, ...

Tópico(s): Advanced Malware Detection Techniques

2013 - SPIE | Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE

Capítulo de livro Acesso aberto Revisado por pares

D. Raghu Raman, Bjorn De Sutter, Bart Coppens, Stijn Volckaert, Koen De Bosschere, Pieter Danhieux, Erik Van Buggenhout,

... up the tunnels. This paper presents a new Metasploit module for integrated penetration testing of DNS tunnels ...

Tópico(s): Software Testing and Debugging Techniques

2013 - Springer Science+Business Media | Lecture notes in computer science

Artigo Acesso aberto Revisado por pares

Dan Tao, Zhaowen Lin, Cheng Lü,

... module. We adopted the permeable automated testing tool Metasploit to perform security testing. In our test experiments, ...

Tópico(s): Software System Performance and Reliability

2015 - Tsinghua University Press | Tsinghua Science & Technology

Capítulo de livro Revisado por pares

Rajiv Kumar, Katlego Tlhagadikgora,

... GFI Languard and OpenVAS) and exploitation tools (Armitage, Metasploit framework) are used to simulate possible attacks.

Tópico(s): Information and Cyber Security

2018 - Springer Science+Business Media | Communications in computer and information science

Revisão Acesso aberto

Lim Kah Seng, Norafida Ithnin, Syed Zainudeen Mohd Said,

... vulnerability assessment.In the meanwhile, exploitation tools like Metasploit and WFuzz are created to compromise web application ...

Tópico(s): Advanced Malware Detection Techniques

2018 - | International Journal of Advanced Computer Research

Artigo Acesso aberto Revisado por pares

Luís Rosa, Miguel Borges de Freitas, Sergey Mazo, Edmundo Monteiro, Tiago Cruz, Paulo Simoes,

... Wireshark dissector, a Nmap NSE PCOM scan, multiple Metasploit PCOM modules, a set of Snort PCOM rules, ...

Tópico(s): Security and Verification in Computing

2019 - Institute of Electrical and Electronics Engineers | IEEE Access

Artigo Acesso aberto Revisado por pares

Ivan Homoliak, Martin Teknös, Martín Ochoa, Dominik Breitenbacher, Saeid Hosseini, Petr Hanáček,

... means of a tool, based on NetEm and Metasploit, which implements our obfuscation operators on any TCP ...

Tópico(s): Advanced Malware Detection Techniques

2019 - Institute for Computer Sciences, Social Informatics and Telecommunications Engineering | ICST Transactions on Security and Safety

Artigo Acesso aberto

Chunlai Du, Shenghui Liu, Lei Si, Yanhui Guo, Tong Jin,

... code execution vulnerability has been constructed under the Metasploit framework and used to evaluate the performance of ...

Tópico(s): Anomaly Detection Techniques and Applications

2020 - | Computers, materials & continua/Computers, materials & continua (Print)

Artigo Acesso aberto Revisado por pares

Valdemar Švábenský, Jan Vykopal, Pavel Šeda, Pavel Čeleda,

... The commands were captured in Bash, ZSH, and Metasploit shells. The data are stored as JSON records, ...

Tópico(s): Software Engineering Research

2021 - Elsevier BV | Data in Brief

Capítulo de livro Acesso aberto Revisado por pares

Ryan Farley, Xinyuan Wang,

... tool that can automatically extract code protected by Metasploit’s polymorphic xor additive feedback encoder Shikata-Ga- ...

Tópico(s): Software Testing and Debugging Techniques

2014 - Springer Science+Business Media | Lecture notes in computer science

Artigo Acesso aberto Revisado por pares

Ramiro Ramirez, Chun-Kai Chang, Shu-Hao Liang,

... is Kali ver. 2022.3, runs Nmap and Metasploit to exploit the target Modbus registers. On the ...

Tópico(s): Physical Unclonable Functions (PUFs) and Hardware Security

2023 - Multidisciplinary Digital Publishing Institute | Electronics

Artigo Acesso aberto

Buthaina Mohammed,

... This test will be done by using the Metasploit Framework.

Tópico(s): Mobile and Web Applications

2016 - | International Journal of Computer Applications

Artigo Acesso aberto

M. Faturrohman, Angelita Salsabila, Zulma Mardiah, Aqwam Rosadi Kardian,

Advances in information and communication technology encourage the development of operating systems. Windows 10 is one of the most widely used operating systems today. Unfortunately, there are still many who do not know that in the Windows 10 system there are several system vulnerabilities and some bugs. One example is the vulnerability in Server Message Block (SMB) on Windows 10 (CVE-2020-0796). This vulnerability exploits the Buffer Overflow method on one of the Execution Server Message Block (SMB) ...

Tópico(s): Environmental Engineering and Cultural Studies

2023 - Universitas Merdeka Malang | JEEMECS (Journal of Electrical Engineering Mechatronic and Computer Science)

Artigo Acesso aberto

Gianpiero Costantino, Ilaria Matteucci,

... inject CAN bus frames by means of a Metasploit module that we wrote.

Tópico(s): Autonomous Vehicle Technology and Safety

2022 - Springer Science+Business Media | Journal of Computer Virology and Hacking Techniques

Capítulo de livro Acesso aberto Revisado por pares

Zian Liu, Chao Chen, Leo Yu Zhang, Shang Gao,

... Eternalblue in Wannacry, and the comparison with the Metasploit’s Eternalblue exploit are presented. The key finding ...

Tópico(s): Network Security and Intrusion Detection

2022 - Springer Science+Business Media | Lecture notes in computer science

Artigo Acesso aberto

Mandeep Singh, Sunny Kumar, Tushant Garg, Niranjan Pandey,

... perform a penetration test on Metasploitable 2 using Metasploit. Metasploitable 2 is a vulnerable system that we ... possible vulnerabilities in a system. By using the Metasploit system to test a system, we can find ... do penetration testing, but we decide to use Metasploit be-cause of its broad uses and simplicity. ... option of either using the command line within Metasploit or by using the community version of the ...

Tópico(s): Digital and Cyber Forensics

2020 - Engg Journals Publications | International Journal Of Engineering And Computer Science

Artigo

Raphael Mudge,

Defend your network by attacking it. Armitage and Metasploit give you the same techniques skilled attackers use, ...

Tópico(s): Software Testing and Debugging Techniques

2011 - Belltown Media | Linux journal

Capítulo de livro Revisado por pares

Usha Banerjee, K. V. Arya,

... such as Distributed Denial-of-Service (DDoS) and metasploits have posed a major problem to the public ...

Tópico(s): Opportunistic and Delay-Tolerant Networks

2014 - Springer Science+Business Media | Lecture notes in electrical engineering

Artigo Acesso aberto Revisado por pares

Mohammad Eid Alzahrani,

... network. The proposed penetration tool uses Nessus and Metasploit tool to find out the vulnerability of a ...

Tópico(s): Advanced Malware Detection Techniques

2018 - IOP Publishing | Journal of Physics Conference Series

Artigo Acesso aberto Revisado por pares

Ibrahim Sadek, Penny Chong, Shafiq Ul Rehman, Yuval Elovici, Alexander Binder,

... Several obfuscated reverse remote shells were generated using Metasploit-Framework, Hyperion, and PEScrambler tools. After compromising the ...

Tópico(s): Network Security and Intrusion Detection

2019 - Elsevier BV | Data in Brief

Capítulo de livro Revisado por pares

Jaromír Janisch, Tomáš Pevný, Viliam Lisý,

... industry-level tools, such as Vagrant, VirtualBox, and Metasploit. Experiments demonstrate that a simulation-trained agent can ...

Tópico(s): Adversarial Robustness in Machine Learning

2024 - Springer Science+Business Media | Lecture notes in computer science