Zum Inhalt springen

Suchergebnisse

  • (Online-Version [abgerufen am 5. November 2008]).  Marc Ruef: Die Kunst des Penetration Testing. 1. Auflage. Computer & Literatur (CuL), Böblingen 2007, ISBN 3-936546-49-5…
    35 KB (3.342 Wörter) - 22:02, 27. Feb. 2025

Suchergebnisse von der englischsprachigen Wikipedia.

  • attack simulation Damn Vulnerable Web Application The Definitive Guide to Penetration Testing "What Is Penetration Testing?". Retrieved 2018-12-18. "What's…
    29 KB (3.605 Wörter) - 03:52, 20. Jul. 2025
  • testing that tests internal structures or workings of an application, as opposed to its functionality (i.e. black-box testing). In white-box testing, an internal…
    12 KB (1.573 Wörter) - 12:37, 22. Mär. 2025
  • Black-box testing, sometimes referred to as specification-based testing, is a method of software testing that examines the functionality of an application without…
    7 KB (821 Wörter) - 22:43, 16. Jun. 2025
  • Web testing is software testing that focuses on web applications. Complete testing of a web-based system before going live can help address issues before…
    5 KB (666 Wörter) - 06:32, 16. Mär. 2025
  • discovered through penetration testing or via a vulnerability scanner. A web application vulnerability scanner, also known as a web application security scanner…
    13 KB (1.327 Wörter) - 19:10, 4. Jun. 2025
  • OWASP (Weiterleitung von „Open Web Application Security Project“)
    organizations and a "low level" penetration testing guide that describes techniques for testing most common web application and web service security issues.…
    18 KB (1.601 Wörter) - 22:20, 10. Jul. 2025
  • Ethical hacking is a term meant to imply a broader category than just penetration testing. Under the owner's consent, white-hat hackers aim to identify any…
    18 KB (1.870 Wörter) - 05:36, 6. Jun. 2025
  • Eddy-current testing (also commonly seen as eddy current testing and ECT) is one of many electromagnetic testing methods used in nondestructive testing (NDT)…
    13 KB (1.631 Wörter) - 11:59, 28. Mai 2025
  • Sexual intercourse (Weiterleitung von „Vaginal penetration“)
    intercourse include anal sex (penetration of the anus by the penis), oral sex (penetration of the mouth by the penis or oral penetration of the female genitalia)…
    168 KB (18.340 Wörter) - 14:41, 14. Jul. 2025
  • Malware Analysis Tools and Techniques SEC503: Network Monitoring and Threat Detection In-Depth SEC542: Web App Penetration Testing and Ethical Hacking SEC540:…
    17 KB (1.559 Wörter) - 12:52, 23. Apr. 2025
  • Fuzzing (Weiterleitung von „Fuzz-testing“)
    programming and software development, fuzzing or fuzz testing is an automated software testing technique that involves providing invalid, unexpected, or random…
    46 KB (4.900 Wörter) - 22:46, 6. Jun. 2025
  • desktop applications, network devices, Web applications, databases, and more. The integrated penetration testing tool, SAINTexploit, demonstrates the path…
    7 KB (833 Wörter) - 13:58, 21. Aug. 2024
  • Offensive Security (Kategorie Software testing)
    American international company working in information security, penetration testing and digital forensics. Beginning around 2007, the company created…
    23 KB (1.565 Wörter) - 08:09, 23. Apr. 2025
  • Cheat Sheet", Google (printable) Google Hacking for Penetration - Using Google as a Security Testing Tool, Introduction by Johnny Long Search Engine- Google…
    9 KB (813 Wörter) - 06:48, 2. Jul. 2025
  • IEST-RP-CC007: Testing ULPA Filters, IEST-RP-CC022: Testing HEPA and ULPA Filter Media, and IEST-RP-CC034: HEPA and ULPA Filter Leak Tests. See also the…
    5 KB (412 Wörter) - 21:37, 14. Mär. 2025
  • performed in the field for on-site testing. Ring Core – similar to Centre Hole Drilling, but with greater penetration, and with the cutting taking place…
    17 KB (2.058 Wörter) - 07:30, 5. Nov. 2024
  • development tools. Silverlight was one of the two application development platforms for Windows Phone, but web pages using Silverlight did not run on the Windows…
    49 KB (4.221 Wörter) - 17:11, 15. Mai 2025
  • applications. Industry-wide welding inspection methods are categorized into Non-Destructive Testing (NDT); Visual Inspection; and Destructive Testing
    91 KB (10.247 Wörter) - 03:40, 22. Mai 2025
  • within the infrastructure rather than bolted on as an afterthought. Penetration testing is another essential component of their work. By simulating cyber…
    21 KB (1.998 Wörter) - 22:10, 17. Feb. 2025
  • Metasploit (Kategorie Security testing tools)
    provides information about security vulnerabilities and aids in penetration testing and IDS signature development. It is owned by Rapid7, a Boston, Massachusetts-based…
    17 KB (1.623 Wörter) - 21:04, 20. Jul. 2025
  • Internet (Weiterleitung von „Web vs. Internet“)
    services, such as the interlinked hypertext documents and applications of the World Wide Web (WWW), electronic mail, internet telephony, streaming media…
    160 KB (16.961 Wörter) - 16:24, 16. Jul. 2025