Vulnerabilities exist in almost all software programs. Some software is more vulnerable than others. A method that can be used to mitigate the vulnerabilities is penetration testing. In this thesis, a penetration test was conducted on a large scale computer system provided by a company. The goal of the thesis was to see if vulnerabilities could be found, with a focus on the field of authentication. After conduction a thorough penetration test there were vulnerabilities found that threaten the confidentiality and integrity of the system. Authentication vulnerabilities were found by leaking password hashes and by performing pass-the-hash and pass-the-ticket exploits.Sårbarheter finns i nästan alla mjukvaruprogram. Vissa mer allvarliga än andr...
Denna uppsats bygger på idén om att hacka det egna systemet före en utomstående hackare gör det för ...
As more services previously conducted physically are being conducted on mobiles, the security of mob...
The purpose of this thesis is to show how to use vulnerability testing to identify and search for se...
Vulnerabilities exist in almost all software programs. Some software is more vulnerable than others....
Almost no software is exempt of vulnerabilities. Penetration testing or ethicalhacking can be used t...
This thesis presents the results of a vulnerability assessment and exploit development targeting a l...
Having a proper method of defense against attacks is crucial for web applications to ensure the safe...
The concept of Smart Buildings and automated processes is a growing trend. Due to a rapidly growing ...
This thesis covers the security testing of a system with connected devices. In a world with an ever-...
When making new software systems, security testing should always be included in the process. In this...
I och med samhällets ökande digitalisering stiger behoven för att kunna fastställa att säkerheten ho...
Idag utvecklas IT branschen otroligt snabbt. Det framkallar även utvecklingen av internetbrott. Rans...
The focus of this Master’s thesis project is automated penetration testing. A penetration test is a ...
Cyber attacks are an increasing problem in the society today. They increase dramatically, especially...
Ethical hacking and penetration testing are two methods often used when organizations and companies ...
Denna uppsats bygger på idén om att hacka det egna systemet före en utomstående hackare gör det för ...
As more services previously conducted physically are being conducted on mobiles, the security of mob...
The purpose of this thesis is to show how to use vulnerability testing to identify and search for se...
Vulnerabilities exist in almost all software programs. Some software is more vulnerable than others....
Almost no software is exempt of vulnerabilities. Penetration testing or ethicalhacking can be used t...
This thesis presents the results of a vulnerability assessment and exploit development targeting a l...
Having a proper method of defense against attacks is crucial for web applications to ensure the safe...
The concept of Smart Buildings and automated processes is a growing trend. Due to a rapidly growing ...
This thesis covers the security testing of a system with connected devices. In a world with an ever-...
When making new software systems, security testing should always be included in the process. In this...
I och med samhällets ökande digitalisering stiger behoven för att kunna fastställa att säkerheten ho...
Idag utvecklas IT branschen otroligt snabbt. Det framkallar även utvecklingen av internetbrott. Rans...
The focus of this Master’s thesis project is automated penetration testing. A penetration test is a ...
Cyber attacks are an increasing problem in the society today. They increase dramatically, especially...
Ethical hacking and penetration testing are two methods often used when organizations and companies ...
Denna uppsats bygger på idén om att hacka det egna systemet före en utomstående hackare gör det för ...
As more services previously conducted physically are being conducted on mobiles, the security of mob...
The purpose of this thesis is to show how to use vulnerability testing to identify and search for se...