ListarComputer Science por tema "Penetration testing (Computer security)"
Mostrando ítems 1-6 de 6
-
Capture the Flag (CTF): Website Tutorial to Boost Cybersecurity Training
(Polytechnic University of Puerto Rico, 2019)Cybersecurity is a new topic in many organizations, including educational organizations. This new field will have an increase, as new technologies emerged. For that reasons, in order to meet the cybersecurity personnel ... -
Hacking Mobile Devices Using WiFi Pineapple Nano
(Polytechnic University of Puerto Rico, 2019)Nowadays wireless access points can be found everywhere from fast food restaurants to private companies embracing Bring Your Own Device (BYOD) policies. These access points present a flexible solution in which different ... -
Implementing USB Attacks with Microcontrollers
(Polytechnic University of Puerto Rico, 2019)The USB specification has become one of the most prominent standards for interconnection between devices and peripherals. Its main objective is to provide ease of use and increase compatibility by implementing standard ... -
Informative Overview of Rainbow Hashes
(Polytechnic University of Puerto Rico, 2022)This article gives an overview for rainbow tables and the results of testing rainbow tables according to the length of the chosen chain. The article presents a password cracking process that contains its own ... -
Offensive Security Using Burp Suite
(Polytechnic University of Puerto Rico, 2020)Burp Suite is a tool used by most professional web page pen tester. It has many features to help the pen tester do his job. The tool help students learn about different type of vulnerabilities like web cache poisoning, ... -
ZAP Proxy and OWASP Top 10
(Polytechnic University of Puerto Rico, 2023)The Zed Attack Proxy is a well-known and popular assessment tool in the cybersecurity community. The Open Web Application Security Project community offers, develops, and maintains the Zed Attack Proxy. The Open Web ...