Automation of recon process for ethical hackers

VR Saraswathi, IS Ahmed, SM Reddy… - … for Advancement in …, 2022 - ieeexplore.ieee.org
The need for Recon automation is rapidly increasing as ethical hackers are being lazy in
performing every little check manually. So as to make the Recon process (Info gathering …

[PDF][PDF] Vulnerability Assessment and Penetration Testing (VAPT) framework: Case study of government's website

A Almaarif, M Lubis - International Journal on Advanced Science …, 2020 - researchgate.net
Information security often neglected by individual or employee or even by the enterprise,
with there is no proper strategy to raise awareness, promote consistency and maintain …

Wireless service at Public University: A survey of users perception on security aspects

AR Lubis, F Fachrizal, M Lubis… - … on Information and …, 2018 - ieeexplore.ieee.org
There is an important growth in the application to detect and protect network from the
intrusion and unauthorized party as well as create access control among users around the …

[PDF][PDF] Automation of Recon Process for Ethical Hackers

IA Sk - researchgate.net
The need for Recon automation is rapidly increasing as ethical hackers are being lazy in
performing every little check manually. So as to make the Recon process (Info gathering …

[PDF][PDF] Automation of Recon process for Ethical Hackers

S Akshay, IA Sk, S Reddy, S Reddy - researchgate.net
The need for Recon automation is rapidly increasing as ethical hackers are being lazy in
performing every little check manually. So as to make the Recon process (Info gathering …