为什么空调| 玉对人身体健康有什么好处| 尹是什么意思| 高回声是什么意思| 吃什么有饱腹感还减肥| 烟花三月下扬州什么意思| 为什么小便是红色的尿| 外感病是什么意思| 丝瓜不能和什么一起吃| 弯弯的月儿像什么| 熊猫长什么样| 为什么掉头发| 油粘米是什么米| 改善记忆力吃什么药好| 印堂发亮预兆着什么| 特点是什么意思| 明前茶什么意思| 单活胎是什么意思| 什么是风寒感冒| 猪头肉炒什么好吃| 什么原因导致尿酸高| 熠熠什么意思| 回归是什么意思| 韩红是什么民族| 家里为什么有跳蚤| 减肥吃什么最好| 茅庐是什么意思| 腹部b超可以检查什么| 一致是什么意思| 牙出血是什么病的前兆| 早射吃什么药可以调理| 身上起痘痘是什么原因| 308什么意思| 做梦捡到钱是什么预兆| 丹田是什么器官| 君王是什么生肖| 异常的反义词是什么| 庹在姓氏上读什么| 子宫内膜不典型增生是什么意思| 宝宝老是摇头是什么原因| 打哈欠是什么原因| 为什么黑色吸热| 口蜜腹剑是什么意思| lcc是什么意思| 什么是优质碳水| 不解大便是什么原因| 华山在什么地方| 力排众议是什么意思| 牙龈肿痛吃什么药效果好| 六点半是什么时辰| 消心痛又叫什么| dm医学上是什么意思| 蒲公英有什么作用和功效| 盘根是什么| 肚子上长毛是什么原因| 鲫鱼不能和什么一起吃| 蜂王浆是什么味道| 尿路感染挂什么科| 水命是什么意思| 睡觉口干是什么原因| 拉肚子恶心想吐吃什么药| 打歌是什么意思| 性功能下降吃什么药| nt检查需要注意什么| 令坦是对方什么人的尊称| 天地人和是什么意思| 儿郎是什么意思| 六扇门是什么意思| 什么是什么意思| 肝气郁结西医叫什么病| lt是什么意思| led什么意思| 左侧淋巴结肿大是什么原因| mpa是什么意思呀| 沼泽是什么意思| 黑下打信是什么任务| 黑裤子配什么颜色的鞋| 渐冻症是什么| ts和cd有什么区别| 沙加女是什么字| 小孩吃什么通便降火| 切除子宫有什么危害| 脑血管挂什么科| 木棉花什么时候开花| 老年人腿浮肿是什么原因引起的| cems是什么意思| 今天天气适合穿什么衣服| 头皮发麻什么原因| o型血和ab型血生的孩子是什么血型| 分心念什么| 现在什么星座| 女生为什么有喉结| 非经期出血是什么原因| 乌江鱼是什么鱼| 身上没力气没劲是什么原因| 坐骨神经痛是什么症状| 祖师香是什么意思| 什么叫意识| ivy什么意思| 什么犹如什么造句| 营销号是什么| 小番茄有什么营养价值| 喝什么水解酒| 包茎是什么| 四季常青财运旺是什么生肖| 骨关节响是什么原因| 春的五行属性是什么| 58年属什么今年多大| 6月份有什么节假日| 拔智齿当天可以吃什么| 阑珊是什么意思| 稀料对人体有什么危害| 海绵体供血不足吃什么药| 右肩膀疼痛是什么原因| 鼻子经常出血是什么原因| 姝字五行属什么| 一个黑一个出读什么| 中国特工组织叫什么| 吃什么可以让奶水增多| 岁贡生是什么意思| 孜字五行属什么| 女性真菌感染是什么原因造成的| 狼藉是什么意思| 插入阴道是什么感觉| 阴阳八卦是什么生肖| 牙医靠什么吃饭| 书五行属性是什么| 左手发麻是什么原因| 塑料属于什么垃圾| 咽炎吃什么药最好效果| 包皮龟头炎用什么药| 腋毛变白是什么原因| 什么是尿常规检查| 璟字五行属什么| 香茗是什么意思| 宫颈涂片检查是查什么| 美国的国球是什么| 薄熙来为什么被抓| 海豹油有什么功效| 什么叫打气 是吸毒吗| 胆囊结石挂什么科| mcm是什么牌子| 验光是什么意思| 肠胃炎引起的发烧吃什么药| 改嫁是什么意思| 明年属什么生肖| cashmere是什么意思| 婴儿枕头里面装什么好| 心绞痛是什么病| 孔雀的尾巴像什么| 岭南是什么地方| zero是什么牌子| ct检查是什么意思| 卒中是什么意思| 苍耳是什么东西| 卧底归来大结局是什么| 行经是什么意思| hpv病毒是什么| 什么叫做t| 虾不能跟什么一起吃| 什么的恐龙| bbs是什么意思| 比肩什么意思| mirage轮胎什么牌子| 梦到怀孕生孩子是什么意思| 乙肝表面抗体高是什么意思| 谁与争锋是什么意思| 大舅哥是什么意思| 谛听是什么| 咽炎吃什么| 妇检tct是什么检查| 男人左眼皮跳是什么预兆| 蛋白尿是什么症状| 天麻什么味道| 业已毕业是什么意思| 去澳门需要什么证件| 折耳猫什么颜色最贵| 胰腺做什么检查| 心肌酶能查出什么病| 吃木耳有什么好处| 睡觉张嘴巴是什么原因| 制动是什么| 形式是什么意思| 病理报告是什么| 结核杆菌是什么| 荷尔蒙爆发是什么意思| 造化弄人是什么意思| 胜造七级浮屠是什么意思| 干可以加什么偏旁| 骨髓水肿是什么意思| 纳豆是什么| 卵巢黄体是什么意思| 锁骨是什么位置| 脑血管堵塞是什么症状| 三七粉是什么| 627是什么星座| 胆囊壁厚是什么意思| 天象是什么意思| 白英别名叫什么| 经期为什么不能拔牙| 土色是什么颜色的图片| 结核有什么症状| 狗肉配什么菜好吃| ssr是什么意思| 唐氏综合征是什么原因造成的| 冥寿是什么意思| mido手表什么档次| 五海瘿瘤丸主要治什么病| 皮脂腺囊肿用什么药膏| 妇科衣原体感染是什么病| 人中跳动是什么原因| 丙字五行属什么| twitter是什么| 胎头位于耻上是什么意思| 暧昧什么意思| 正常人尿液是什么颜色| 人的运气跟什么有关| 骨髓穿刺是检查什么病| 什么叫数字货币| 轩尼诗是什么酒| 小孩办理护照需要什么材料| 怀孕周期是从什么时候开始算的| 2月1号什么星座| 心烦焦虑吃什么药| 鱼香肉丝用什么肉| 纨绔子弟是什么意思| 生肖鼠和什么生肖最配| 天麻是什么东西| 焚书坑儒什么意思| 血液凝固快是什么原因| 鲜牛奶和纯牛奶有什么区别| 孕激素低吃什么补得快| 第一次要注意什么| 高铁动车有什么区别| 真菌感染皮肤病用什么药最好| 上颚痒是什么原因| 塑料五行属什么| 驻外大使是什么级别| 什么中药补气血效果最好| 早孕有什么反应| 考验是什么意思| 形态各异的异是什么意思| 护理主要学什么| 盗汗挂什么科| 放的偏旁是什么| ket是什么意思| 没有斗代表什么| 心电图窦性心动过速是什么意思| 山魈是什么| 腹泻可以吃什么食物| 脚拇指发麻是什么原因| 论坛是什么| 什么是类风湿性关节炎| 嘱托是什么意思| 热痱子是什么样子图片| rash什么意思| 腺肌症有什么症状| 血红蛋白偏低是什么意思| 百香果什么时候成熟| 公安局跟派出所有什么区别| 心电图p是什么意思| 川芎的功效与作用是什么| 孽缘是什么意思| 爱豆是什么| 百度Jump to content

脑腐什么意思

From Wikipedia, the free encyclopedia
(Redirected from Penetration testing)
百度 报道称,尽管基于个人电脑和智能手机的证券交易已在世界各地兴起,但中国的许多股民仍然喜欢在证券公司营业部进行交易操作,即便要为此支付更高的佣金。

A penetration test, colloquially known as a pentest, is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system;[1] this is not to be confused with a vulnerability assessment.[2] The test is performed to identify weaknesses (or vulnerabilities), including the potential for unauthorized parties to gain access to the system's features and data,[3][4] as well as strengths,[5] enabling a full risk assessment to be completed.

The process typically identifies the target systems and a particular goal, then reviews available information and undertakes various means to attain that goal. A penetration test target may be a white box (about which background and system information are provided in advance to the tester) or a black box (about which only basic information other than the company name is provided). A gray box penetration test is a combination of the two (where limited knowledge of the target is shared with the auditor).[6] A penetration test can help identify a system's vulnerabilities to attack and estimate how vulnerable it is.[7][5]

Security issues that the penetration test uncovers should be reported to the system owner.[8] Penetration test reports may also assess potential impacts to the organization and suggest countermeasures to reduce the risk.[8]

The UK National Cyber Security Center describes penetration testing as: "A method for gaining assurance in the security of an IT system by attempting to breach some or all of that system's security, using the same tools and techniques as an adversary might."[9]

The goals of a penetration test vary depending on the type of approved activity for any given engagement, with the primary goal focused on finding vulnerabilities that could be exploited by a nefarious actor, and informing the client of those vulnerabilities along with recommended mitigation strategies.[10]

Penetration tests are a component of a full security audit. For example, the Payment Card Industry Data Security Standard requires penetration testing on a regular schedule, and after system changes.[11] Penetration testing also can support risk assessments as outlined in the NIST Risk Management Framework SP 800-53.[12]

Several standard frameworks and methodologies exist for conducting penetration tests. These include the Open Source Security Testing Methodology Manual (OSSTMM), the Penetration Testing Execution Standard (PTES), the NIST Special Publication 800-115, the Information System Security Assessment Framework (ISSAF) and the OWASP Testing Guide. CREST, a not for profit professional body for the technical cyber security industry, provides its CREST Defensible Penetration Test standard that provides the industry with guidance for commercially reasonable assurance activity when carrying out penetration tests.[13]

Flaw hypothesis methodology is a systems analysis and penetration prediction technique where a list of hypothesized flaws in a software system are compiled through analysis of the specifications and the documentation of the system. The list of hypothesized flaws is then prioritized on the basis of the estimated probability that a flaw actually exists, and on the ease of exploiting it to the extent of control or compromise. The prioritized list is used to direct the actual testing of the system.

There are different types of penetration testing, depending on the goal of the organization which include: Network (external and internal), Wireless, Web Application, Social Engineering, and Remediation Verification.

Even more recently a common pen testing tool called a flipper was used to hack the MGM casinos in 2023 by a group called Scattered Spiders[14] showing the versatility and power of some of the tools of the trade.

History

[edit]

By the mid 1960s, growing popularity of time-sharing computer systems that made resources accessible over communication lines created new security concerns. As the scholars Deborah Russell and G. T. Gangemi Sr. explain, "The 1960s marked the true beginning of the age of computer security."[15]:?27?

In June 1965, for example, several of the U.S.'s leading computer security experts held one of the first major conferences on system security—hosted by the government contractor, the System Development Corporation (SDC). During the conference, someone noted that one SDC employee had been able to easily undermine various system safeguards added to SDC's AN/FSQ-32 time-sharing computer system. In hopes that further system security study would be useful, attendees requested "...studies to be conducted in such areas as breaking security protection in the time-shared system." In other words, the conference participants initiated one of the first formal requests to use computer penetration as a tool for studying system security.[16]:?7–8?

At the Spring 1968 Joint Computer Conference, many leading computer specialists again met to discuss system security concerns. During this conference, the computer security experts Willis Ware, Harold Petersen, and Rein Turn, all of the RAND Corporation, and Bernard Peters of the National Security Agency (NSA), all used the phrase "penetration" to describe an attack against a computer system. In a paper, Ware referred to the military's remotely accessible time-sharing systems, warning that "Deliberate attempts to penetrate such computer systems must be anticipated." His colleagues Petersen and Turn shared the same concerns, observing that online communication systems "...are vulnerable to threats to privacy," including "deliberate penetration." Bernard Peters of the NSA made the same point, insisting that computer input and output "...could provide large amounts of information to a penetrating program." During the conference, computer penetration would become formally identified as a major threat to online computer systems.[16]:?8?

The threat that computer penetration posed was next outlined in a major report organized by the United States Department of Defense (DoD) in late 1967. Essentially, DoD officials turned to Willis Ware to lead a task force of experts from NSA, CIA, DoD, academia, and industry to formally assess the security of time-sharing computer systems. By relying on many papers presented during the Spring 1967 Joint Computer Conference, the task force largely confirmed the threat to system security that computer penetration posed. Ware's report was initially classified, but many of the country's leading computer experts quickly identified the study as the definitive document on computer security.[16] Jeffrey R. Yost of the Charles Babbage Institute has more recently described the Ware report as "...by far the most important and thorough study on technical and operational issues regarding secure computing systems of its time period."[17] In effect, the Ware report reaffirmed the major threat posed by computer penetration to the new online time-sharing computer systems.

To better understand system weaknesses, the federal government and its contractors soon began organizing teams of penetrators, known as tiger teams, to use computer penetration to test system security. Deborah Russell and G. T. Gangemi Sr. stated that during the 1970s "...'tiger teams' first emerged on the computer scene. Tiger teams were government and industry-sponsored teams of crackers who attempted to break down the defenses of computer systems in an effort to uncover, and eventually patch, security holes."[15]:?29?

A leading scholar on the history of computer security, Donald MacKenzie, similarly points out that, "RAND had done some penetration studies (experiments in circumventing computer security controls) of early time-sharing systems on behalf of the government."[18][19] Jeffrey R. Yost of the Charles Babbage Institute, in his own work on the history of computer security, also acknowledges that both the RAND Corporation and the SDC had "engaged in some of the first so-called 'penetration studies' to try to infiltrate time-sharing systems in order to test their vulnerability."[17] In virtually all these early studies, tiger teams successfully broke into all targeted computer systems, as the country's time-sharing systems had poor defenses.

Of early tiger team actions, efforts at the RAND Corporation demonstrated the usefulness of penetration as a tool for assessing system security. At the time, one RAND analyst noted that the tests had "...demonstrated the practicality of system-penetration as a tool for evaluating the effectiveness and adequacy of implemented data security safeguards." In addition, a number of the RAND analysts insisted that the penetration test exercises all offered several benefits that justified its continued use. As they noted in one paper, "A penetrator seems to develop a diabolical frame of mind in his search for operating system weaknesses and incompleteness, which is difficult to emulate." For these reasons and others, many analysts at RAND recommended the continued study of penetration techniques for their usefulness in assessing system security.[16]:?9?

Presumably the leading computer penetration expert during these formative years was James P. Anderson, who had worked with the NSA, RAND, and other government agencies to study system security. In the early 1971, the U.S. Air Force contracted Anderson's private company to study the security of its time-sharing system at the Pentagon. In his study, Anderson outlined a number of major factors involved in computer penetration. Anderson described a general attack sequence in steps:

  1. Find an exploitable vulnerability.
  2. Design an attack around it.
  3. Test the attack.
  4. Seize a line in use.
  5. Enter the attack.
  6. Exploit the entry for information recovery.

Over time, Anderson's description of general computer penetration steps helped guide many other security experts, who relied on this technique to assess time-sharing computer system security.[16]:?9?

In the following years, computer penetration as a tool for security assessment became more refined and sophisticated. In the early 1980s, the journalist William Broad briefly summarized the ongoing efforts of tiger teams to assess system security. As Broad reported, the DoD-sponsored report by Willis Ware "...showed how spies could actively penetrate computers, steal or copy electronic files and subvert the devices that normally guard top-secret information. The study touched off more than a decade of quiet activity by elite groups of computer scientists working for the Government who tried to break into sensitive computers. They succeeded in every attempt."[20]

While these various studies may have suggested that computer security in the U.S. remained a major problem, the scholar Edward Hunt has more recently made a broader point about the extensive study of computer penetration as a security tool. Hunt suggests in a recent paper on the history of penetration testing that the defense establishment ultimately "...created many of the tools used in modern day cyberwarfare," as it carefully defined and researched the many ways that computer penetrators could hack into targeted systems.[16]:?5?

Tools

[edit]

A wide variety of security assessment tools are available to assist with penetration testing, including free-of-charge, free software, and commercial software.

Specialized OS distributions

[edit]

Several operating system distributions are geared towards penetration testing.[21] Such distributions typically contain a pre-packaged and pre-configured set of tools. The penetration tester does not have to hunt down each individual tool, which might increase the risk of complications—such as compile errors, dependency issues, and configuration errors. Also, acquiring additional tools may not be practical in the tester's context.

Notable penetration testing OS examples include:

Many other specialized operating systems facilitate penetration testing—each more or less dedicated to a specific field of penetration testing.

A number of Linux distributions include known OS and application vulnerabilities, and can be deployed as targets to practice against. Such systems help new security professionals try the latest security tools in a lab environment. Examples include Damn Vulnerable Linux (DVL), the OWASP Web Testing Environment (WTW), and Metasploitable.

Software frameworks

[edit]

Hardware tools

[edit]

There are hardware tools specifically designed for penetration testing. However, not all hardware tools used in penetration testing are purpose-built for this task. Some devices, such as measuring and debugging equipment, are repurposed for penetration testing due to their advanced functionality and versatile capabilities.

  • Proxmark3 — multi-purpose hardware tool for radio-frequency identification (RFID) security analysis.
  • BadUSB — toolset for exploiting vulnerabilities in USB devices to inject malicious keystrokes or payloads.
  • Flipper Zero — portable, open-source multi-functional device pentesting wireless protocols such as Sub-GHz, RFID, NFC, Infrared and Bluetooth.
  • Raspberry Pi — a compact, versatile single-board computer commonly used in penetration testing for tasks like network reconnaissance and exploitation.
  • SDR (Software-defined Radio)— versatile tool for analyzing and attacking radio communications and protocols, including intercepting, emulating, decoding, and transmitting signals.
  • ChipWhisperer — specialized hardware tool for side-channel attacks, allowing analysis of cryptographic implementations and vulnerabilities through power consumption or electromagnetic emissions.

Penetration testing phases

[edit]

The process of penetration testing may be simplified into the following five phases:

  1. Reconnaissance: The act of gathering important information on a target system. This information can be used to better attack the target. For example, open source search engines can be used to find data that can be used in a social engineering attack.
  2. Scanning: Uses technical tools to further the attacker's knowledge of the system. For example, Nmap can be used to scan for open ports.
  3. Gaining access: Using the data gathered in the reconnaissance and scanning phases, the attacker can use a payload to exploit the targeted system. For example, Metasploit can be used to automate attacks on known vulnerabilities. Once an attacker has exploited one vulnerability they may gain access to other machines so the process repeats i.e. they look for new vulnerabilities and attempt to exploit them. This process is referred to as pivoting.
  4. Maintaining access: Maintaining access requires taking the steps involved in being able to be persistently within the target environment in order to gather as much data as possible.
  5. Covering tracks: The attacker must clear any trace of compromising the victim system, any type of data gathered, log events, in order to remain anonymous.[22]
  6. Reporting: Vulnerabilities are classified via risk matrix and documented in a report which contains executive summary, vulnerability description, and recommendations for remediation.
  7. Remediation & Re-testing: Once the target organization assesses the penetration test report and remediates items based on their internal risk appetite, a re-test of those vulnerabilities is performed in order to confirm remediation was successful, and a cut down re-test report is provided showing the results.[23]

Vulnerabilities

[edit]

Legal operations that let the tester execute an illegal operation include unescaped SQL commands, unchanged hashed passwords in source-visible projects, human relationships, and old hashing or cryptographic functions. A single flaw may not be enough to enable a critically serious exploit. Leveraging multiple known flaws and shaping the payload in a way that appears as a valid operation is almost always required. Metasploit provides a ruby library for common tasks, and maintains a database of known exploits.

When working under budget and time constraints, fuzzing is a common technique that discovers vulnerabilities. It aims to get an unhandled error through random input. The tester uses random input to access the less often used code paths. Well-trodden code paths are usually free of errors. Errors are useful because they either expose more information, such as HTTP server crashes with full info trace-backs—or are directly usable, such as buffer overflows.

Imagine a website has 100 text input boxes. A few are vulnerable to SQL injections on certain strings. Submitting random strings to those boxes for a while will hopefully hit the bugged code path. The error shows itself as a broken HTML page half rendered because of an SQL error. In this case, only text boxes are treated as input streams. However, software systems have many possible input streams, such as cookie and session data, the uploaded file stream, RPC channels, or memory. Errors can happen in any of these input streams. The test goal is to first get an unhandled error and then understand the flaw based on the failed test case. Testers write an automated tool to test their understanding of the flaw until it is correct. After that, it may become obvious how to package the payload so that the target system triggers its execution. If this is not viable, one can hope that another error produced by the fuzzer yields more fruit. The use of a fuzzer saves time by not checking adequate code paths where exploits are unlikely.

Payload

[edit]

The illegal operation, or payload in Metasploit terminology, can include functions for logging keystrokes, taking screenshots, installing adware, stealing credentials, creating backdoors using shellcode, or altering data. Some companies maintain large databases of known exploits and provide products that automatically test target systems for vulnerabilities:

Standardized government penetration test services

[edit]

The General Services Administration (GSA) has standardized the "penetration test" service as a pre-vetted support service, to rapidly address potential vulnerabilities, and stop adversaries before they impact US federal, state and local governments. These services are commonly referred to as Highly Adaptive Cybersecurity Services (HACS) and are listed at the US GSA Advantage website.[24]

This effort has identified key service providers which have been technically reviewed and vetted to provide these advanced penetration services. This GSA service is intended to improve the rapid ordering and deployment of these services, reduce US government contract duplication, and to protect and support the US infrastructure in a more timely and efficient manner.

132-45A Penetration Testing[25] is security testing in which service assessors mimic real-world attacks to identify methods for circumventing the security features of an application, system, or network. HACS Penetration Testing Services typically strategically test the effectiveness of the organization's preventive and detective security measures employed to protect assets and data. As part of this service, certified ethical hackers typically conduct a simulated attack on a system, systems, applications or another target in the environment, searching for security weaknesses. After testing, they will typically document the vulnerabilities and outline which defenses are effective and which can be defeated or exploited.

In the UK penetration testing services are standardized via professional bodies working in collaboration with National Cyber Security Centre.

The outcomes of penetration tests vary depending on the standards and methodologies used. There are five penetration testing standards: Open Source Security Testing Methodology Manual[26] (OSSTMM), Open Web Application Security Project (OWASP), National Institute of Standards and Technology (NIST00), Information System Security Assessment Framework (ISSAF), and Penetration Testing Methodologies and Standards (PTES).

See also

[edit]

General references

[edit]
  • The Definitive Guide to Penetration Testing[27]

References

[edit]
  1. ^ "What Is Penetration Testing?". Retrieved 2025-08-05.
  2. ^ "What's the difference between a vulnerability assessment and a penetration test?". Retrieved 2025-08-05.
  3. ^ The CISSP? and CAPCM Prep Guide: Platinum Edition. John Wiley & Sons. 2025-08-05. ISBN 978-0-470-00792-1. A penetration test can determine how a system reacts to an attack, whether or not a system's defenses can be breached, and what information can be acquired from the system
  4. ^ Kevin M. Henry (2012). Penetration Testing: Protecting Networks and Systems. IT Governance Ltd. ISBN 978-1-849-28371-7. Penetration testing is the simulation of an attack on a system, network, piece of equipment or other facility, with the objective of proving how vulnerable that system or "target" would be to a real attack.
  5. ^ a b Cris Thomas (Space Rogue), Dan Patterson (2017). Password Cracking is easy with IBM's Space Rogue (Video). CBS Interactive. Event occurs at 4:30-5:30. Retrieved 1 December 2017.
  6. ^ "Pen Testing Types explained". 2025-08-05. Retrieved 2025-08-05.
  7. ^ "Penetration Testing: Assessing Your Overall Security Before Attackers Do" (pdf). SANS Institute. Archived from the original on February 27, 2014. Retrieved 16 January 2014.
  8. ^ a b "Writing a Penetration Testing Report". SANS Institute. Retrieved 12 January 2015.
  9. ^ "Penetration Testing". NCSC. Aug 2017. Retrieved 30 October 2018.
  10. ^ Patrick Engebretson, The basics of hacking and penetration testing Archived 2025-08-05 at the Wayback Machine, Elsevier, 2013
  11. ^ Alan Calder and Geraint Williams (2014). PCI DSS: A Pocket Guide, 3rd Edition. IT Governance Limited. ISBN 978-1-84928-554-4. network vulnerability scans at least quarterly and after any significant change in the network
  12. ^ "NIST Risk Management Framework". NIST. 2020. Archived from the original on May 6, 2021.
  13. ^ "CREST releases guidance on penetration testing". IntelligentCISO. 2022.
  14. ^ "5 defendants linked to 'Scattered Spider' hacker group behind 2023 MGM, Caesars cyberattacks". KLAS. 2025-08-05. Retrieved 2025-08-05.
  15. ^ a b Russell, Deborah; Gangemi, G.T. (1991). Computer Security Basics. O'Reilly Media Inc. ISBN 9780937175712.
  16. ^ a b c d e f Hunt, Edward (2012). "US Government Computer Penetration Programs and the Implications for Cyberwar". IEEE Annals of the History of Computing. 34 (3): 4–21. doi:10.1109/MAHC.2011.82. S2CID 16367311.
  17. ^ a b Yost, Jeffrey R. (2007). de Leeuw, Karl; Bergstra, Jan (eds.). A History of Computer Security Standards, in The History of Information Security: A Comprehensive Handbook. Elsevier. pp. 601–602.
  18. ^ Mackenzie, Donald; Pottinger, Garrel (1997). "Mathematics, Technology, and Trust: Formal Verification, Computer Security, and the U.S. Military". IEEE Annals of the History of Computing. 19 (3): 41–59. doi:10.1109/85.601735.
  19. ^ Mackenzie, Donald A. (2004). Mechanizing Proof: Computing, Risk, and Trust. Massachusetts Institute of Technology. p. 156. ISBN 978-0-262-13393-7.
  20. ^ Broad, William J. (September 25, 1983). "Computer Security Worries Military Experts", The New York Times
  21. ^ Faircloth, Jeremy (2011). "Chapter 1:Tools of the Trade" (PDF). Penetration Tester's Open Source Toolkit (Third ed.). Elsevier. ISBN 978-1597496278. Retrieved 4 January 2018.[need quotation to verify]
  22. ^ "Summarizing The Five Phases of Penetration Testing - Cybrary". Cybrary. 2025-08-05. Archived from the original on April 8, 2019. Retrieved 2025-08-05.
  23. ^ "Penetration Testing Australia: Meeting Client Security Expectations and Excelling in Vendor Selection". Core Sentinel. Retrieved 2025-08-05.
  24. ^ "GSA HACS SIN 132-45 Services". 1 March 2018. Archived from the original on 23 March 2019. Retrieved 1 March 2018.
  25. ^ "Pen Testing Services". 1 March 2018. Archived from the original on 26 June 2018. Retrieved 1 March 2018.
  26. ^ "Open-Source Security Testing Methodology Manual - an overview | ScienceDirect Topics". www.sciencedirect.com. Retrieved 2025-08-05.
  27. ^ "Definitive Guide to Penetration Testing | Core Sentinel". Core Sentinel. Retrieved 2025-08-05.
肾功能不好吃什么药 乳腺1类是什么意思 腹茧症是什么病 樱桃和车厘子有什么区别 精神病吃什么药最好
怀孕做nt检查什么 龟头流脓小便刺痛吃什么药 炎黄子孙是什么生肖 ntl是什么意思 乙肝1245阳性什么意思
小甲鱼吃什么 梅长苏是什么电视剧 宋朝前面是什么朝代 内脂豆腐是什么 中国的国树是什么
今夕何夕是什么意思 右侧后背疼是什么原因 世界大战是什么意思 胎儿什么时候入盆 十月十六号是什么星座
professional是什么意思hcv9jop2ns1r.cn 疣吃什么药能治好hcv7jop4ns8r.cn 排湿气吃什么药效果好hcv8jop6ns7r.cn 七月十五是什么节hcv8jop9ns8r.cn 沐猴而冠代表什么生肖hcv9jop2ns6r.cn
朵字五行属什么onlinewuye.com 负距离接触是什么意思0297y7.com 两个束念什么hcv9jop3ns8r.cn 飞蚊症用什么药物治疗最好hcv9jop7ns5r.cn 做鸡蛋饼用什么面粉好xinmaowt.com
孩子为什么厌学hcv9jop2ns9r.cn 浑身酸痛什么原因sanhestory.com 扑救带电火灾应选用什么灭火器bysq.com york是什么牌子hcv8jop4ns5r.cn 肠癌是什么症状hcv8jop3ns9r.cn
贾赦和贾政是什么关系hcv8jop6ns3r.cn 争奇斗艳什么意思hcv9jop3ns4r.cn 命根子是什么hcv7jop7ns1r.cn 又热又冷是什么原因hcv8jop0ns8r.cn marisfrolg是什么牌子hcv9jop0ns0r.cn
百度