Abstract Information security is a growing concern in companies and organizations, being even higher when linked to financial platforms where sensitive information exists. This article explains the techniques used in the pentesting performed on the ERP software developed in APEX 5 by the University of Azuay. To achieve this goal, six stages has been considered for perform a penetration test: I) Conceptualization, where is defined the scope of the tests to be performed. II) Preparation of the laboratory, which identifies some of the tools used to initiate the safety tests. III) Obtaining of information, where the possible objects are recognized and scanned in greater depth to identify intrinsic characteristics for subsequently exploit them....
Penetration testing is a form of security auditing that attempts to measure both the target organiza...
Penetration testing also known as Pen Test is a series of activities which is performed by authorize...
As the use of web applications is increasing among a number of different industries, many companies ...
As one of the most common techniques to assess information system security, penetration testing lega...
In recent years the expansion of the internet also brought an increase in computer crime. The target...
The advancement of technology has led to increased cyber-attacks. Companies need a lot of resources ...
Code protections aim at blocking (or at least delaying) reverse engineering and tampering attacks to...
With growing reliance on the Internet, E-commerce and network-based services organizations, companie...
Code protections aim at blocking (or at least delaying) reverse engineering and tampering attacks to...
Modern web applications provide people a vast amount of services and complex function-ality. More an...
The focus of a penetration test usually revolves around the identification of vulnerabilities, their...
This thesis discusses the design and implementation of integrated penetration testing system. In the...
In this paper Authors will be discussing the penetration testing in system administration and challe...
There is a growing tendency in the security of an ERP systems. This has resulted in security issues...
The educational ERP systems have vulnerabilities at the different layers such as version-specific vu...
Penetration testing is a form of security auditing that attempts to measure both the target organiza...
Penetration testing also known as Pen Test is a series of activities which is performed by authorize...
As the use of web applications is increasing among a number of different industries, many companies ...
As one of the most common techniques to assess information system security, penetration testing lega...
In recent years the expansion of the internet also brought an increase in computer crime. The target...
The advancement of technology has led to increased cyber-attacks. Companies need a lot of resources ...
Code protections aim at blocking (or at least delaying) reverse engineering and tampering attacks to...
With growing reliance on the Internet, E-commerce and network-based services organizations, companie...
Code protections aim at blocking (or at least delaying) reverse engineering and tampering attacks to...
Modern web applications provide people a vast amount of services and complex function-ality. More an...
The focus of a penetration test usually revolves around the identification of vulnerabilities, their...
This thesis discusses the design and implementation of integrated penetration testing system. In the...
In this paper Authors will be discussing the penetration testing in system administration and challe...
There is a growing tendency in the security of an ERP systems. This has resulted in security issues...
The educational ERP systems have vulnerabilities at the different layers such as version-specific vu...
Penetration testing is a form of security auditing that attempts to measure both the target organiza...
Penetration testing also known as Pen Test is a series of activities which is performed by authorize...
As the use of web applications is increasing among a number of different industries, many companies ...