All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Effective penetration testing with Metasploit framework and methodologies

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216275%3A25530%2F14%3A39898060" target="_blank" >RIV/00216275:25530/14:39898060 - isvavai.cz</a>

  • Result on the web

  • DOI - Digital Object Identifier

Alternative languages

  • Result language

    angličtina

  • Original language name

    Effective penetration testing with Metasploit framework and methodologies

  • Original language description

    Nowadays, information security is very important, because more and more confidential information, like medical reports, is being stored electronically on computer systems and those systems are often connected to computer networks. This represents new challenges for people working in information technology. They have to ensure that those systems are as much secure as possible and confidential information will not be revealed. One possible way how to prove system security is to conduct regular penetrationtests - e.g. simulate attacker's malicious activity. This article briefly introduces the basics of penetration testing and shows how to deploy and use Metasploit framework when conducting penetration testing. Finally, a case study in production environment is shown. Software tools and techniques described in this work are also valid and applicable for SCADA systems and moreover in any other field where computer networks are used.

  • Czech name

  • Czech description

Classification

  • Type

    D - Article in proceedings

  • CEP classification

    IN - Informatics

  • OECD FORD branch

Result continuities

  • Project

  • Continuities

    S - Specificky vyzkum na vysokych skolach

Others

  • Publication year

    2014

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    COMPUTATIONAL INTELLIGENCE and INFORMATICS PROCEEDINGS (CINTI 2014): Proceedings

  • ISBN

    978-1-4799-5338-7

  • ISSN

  • e-ISSN

  • Number of pages

    6

  • Pages from-to

    237-242

  • Publisher name

    IEEE (Institute of Electrical and Electronics Engineers)

  • Place of publication

    Piscataway

  • Event location

    Budapest

  • Event date

    Nov 19, 2014

  • Type of event by nationality

    WRD - Celosvětová akce

  • UT code for WoS article