Penterep: Comprehensive Penetration Testing with Adaptable Interactive Checklists
dc.contributor.author | Lazarov, Willi | cs |
dc.contributor.author | Šeda, Pavel | cs |
dc.contributor.author | Martinásek, Zdeněk | cs |
dc.contributor.author | Kümmel, Roman | cs |
dc.coverage.issue | 7 | cs |
dc.coverage.volume | 154 | cs |
dc.date.accessioned | 2025-04-11T07:56:03Z | |
dc.date.available | 2025-04-11T07:56:03Z | |
dc.date.issued | 2025-03-17 | cs |
dc.description.abstract | In the contemporary landscape of cybersecurity, the importance of effective penetration testing is underscored by NIS2, emphasizing the need to assess and demonstrate cyber resilience. This paper introduces an innovative approach to penetration testing that employs interactive checklists, supporting both manual and automated tests, as demonstrated within the Penterep environment. These checklists, functioning as a quantifiable measure of test completeness, guide pentesters through methodological testing, addressing the inherent challenges of the security testing domain. While some may perceive a limitation in the dependency on predefined checklists, the results from a presented case study underscore the criticality of methodological testing. The study reveals that relying solely on fully automated tools would be inadequate to identify all vulnerabilities and flaws without the inclusion of manual tests. Our innovative approach complements established methodologies, such as PTES, OWASP, and NIST, providing crucial support to penetration testers and ensuring a comprehensive testing process. Implemented within the Penterep environment, our approach is designed with deployment flexibility (both on-premises and cloud-based), setting it apart through an overview comparison with existing tools aligned with state-of-the-art penetration testing approaches. This flexible and scalable approach effectively bridges the gap between manual and automated testing, meeting the increasing demands for effectiveness and adaptability in penetration testing. | en |
dc.format | text | cs |
dc.format.extent | 1-16 | cs |
dc.format.mimetype | application/pdf | cs |
dc.identifier.citation | COMPUTERS & SECURITY. 2025, vol. 154, issue 7, p. 1-16. | en |
dc.identifier.doi | 10.1016/j.cose.2025.104399 | cs |
dc.identifier.issn | 1872-6208 | cs |
dc.identifier.orcid | 0000-0001-6820-8391 | cs |
dc.identifier.orcid | 0000-0002-6689-1980 | cs |
dc.identifier.orcid | 0000-0002-6504-5619 | cs |
dc.identifier.other | 197057 | cs |
dc.identifier.researcherid | AHC-2481-2022 | cs |
dc.identifier.researcherid | AAY-3211-2021 | cs |
dc.identifier.researcherid | H-8896-2018 | cs |
dc.identifier.scopus | 58316001100 | cs |
dc.identifier.scopus | 56955391700 | cs |
dc.identifier.scopus | 54416101900 | cs |
dc.identifier.uri | https://hdl.handle.net/11012/250881 | |
dc.language.iso | en | cs |
dc.publisher | Elsevier | cs |
dc.relation.ispartof | COMPUTERS & SECURITY | cs |
dc.relation.uri | https://www.sciencedirect.com/science/article/pii/S0167404825000884 | cs |
dc.rights | Creative Commons Attribution-NonCommercial 4.0 International | cs |
dc.rights.access | openAccess | cs |
dc.rights.sherpa | http://www.sherpa.ac.uk/romeo/issn/1872-6208/ | cs |
dc.rights.uri | http://creativecommons.org/licenses/by-nc/4.0/ | cs |
dc.subject | Checklists | en |
dc.subject | Cybersecurity | en |
dc.subject | Ethical hacking | en |
dc.subject | Methodology | en |
dc.subject | Penetration testing | en |
dc.subject | Reporting | en |
dc.subject | Vulnerability assessment | en |
dc.title | Penterep: Comprehensive Penetration Testing with Adaptable Interactive Checklists | en |
dc.type.driver | article | en |
dc.type.status | Peer-reviewed | en |
dc.type.version | publishedVersion | en |
eprints.grantNumber | info:eu-repo/grantAgreement/MV0/VK/VK01030019 | cs |
sync.item.dbid | VAV-197057 | en |
sync.item.dbtype | VAV | en |
sync.item.insts | 2025.04.11 09:56:03 | en |
sync.item.modts | 2025.04.11 09:33:31 | en |
thesis.grantor | Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií. Ústav telekomunikací | cs |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- 1s2.0S0167404825000884main.pdf
- Size:
- 2.03 MB
- Format:
- Adobe Portable Document Format
- Description:
- file 1s2.0S0167404825000884main.pdf