Web-sovelluksen haavoittuvuustestauksen automatisointi

Haavoittuvuustestauksessa käytetään samanlaista lähestymistapaa ja tekniikkaamiltei jokaisessa testauksessa. Toistettavien töiden automatisointi auttaa haavoittuvuustes-taajia käyttämään testausaikansa hyödyllisemmin suorittaakseen syvällisempiä testejä. Tä-män avulla saadaan parannettua järjestelmi...

Full description

Bibliographic Details
Main Author: Jokela, Patrik
Other Authors: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, Jyväskylän yliopisto, University of Jyväskylä
Format: Bachelor's thesis
Language:fin
Published: 2020
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/73278
_version_ 1826225797233377280
author Jokela, Patrik
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_facet Jokela, Patrik Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Jokela, Patrik Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_sort Jokela, Patrik
datasource_str_mv jyx
description Haavoittuvuustestauksessa käytetään samanlaista lähestymistapaa ja tekniikkaamiltei jokaisessa testauksessa. Toistettavien töiden automatisointi auttaa haavoittuvuustes-taajia käyttämään testausaikansa hyödyllisemmin suorittaakseen syvällisempiä testejä. Tä-män avulla saadaan parannettua järjestelmien tietoturvallisuutta. Tutkimuksessa havaittiin,että tiedustelu- ja skannausvaihe voidaan automatisoida miltei kokonaan sekä hyökkäysvai-heen osia on mahdollista suorittaa automaattisesti työkaluilla Penetration testing contains several basic approaches and techniques that are si-milar in almost every test case. Automating repeatable tasks helps penetration testers to usetheir testing time more efficiently to carry out more deeper tests. This has an positive affecton the cyber security. In this research we found out that it is possible to almost fully auto-mate the reconnaissance and scanning phases but also parts of the exploitation phase can beautomated using automatic tools.
first_indexed 2024-09-11T08:50:23Z
format Kandityö
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "Saksa, Tytti", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Jokela, Patrik", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2020-12-17T07:55:42Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2020-12-17T07:55:42Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2020", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/73278", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Haavoittuvuustestauksessa k\u00e4ytet\u00e4\u00e4n samanlaista l\u00e4hestymistapaa ja tekniikkaamiltei jokaisessa testauksessa. Toistettavien t\u00f6iden automatisointi auttaa haavoittuvuustes-taajia k\u00e4ytt\u00e4m\u00e4\u00e4n testausaikansa hy\u00f6dyllisemmin suorittaakseen syv\u00e4llisempi\u00e4 testej\u00e4. T\u00e4-m\u00e4n avulla saadaan parannettua j\u00e4rjestelmien tietoturvallisuutta. Tutkimuksessa havaittiin,ett\u00e4 tiedustelu- ja skannausvaihe voidaan automatisoida miltei kokonaan sek\u00e4 hy\u00f6kk\u00e4ysvai-heen osia on mahdollista suorittaa automaattisesti ty\u00f6kaluilla", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Penetration testing contains several basic approaches and techniques that are si-milar in almost every test case. Automating repeatable tasks helps penetration testers to usetheir testing time more efficiently to carry out more deeper tests. This has an positive affecton the cyber security. In this research we found out that it is possible to almost fully auto-mate the reconnaissance and scanning phases but also parts of the exploitation phase can beautomated using automatic tools.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Miia Hakanen (mihakane@jyu.fi) on 2020-12-17T07:55:42Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2020-12-17T07:55:42Z (GMT). No. of bitstreams: 0\n Previous issue date: 2020", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "21", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "haavoittuvuustestaus", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "hakkerointi", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "automatisointi", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietoturvallisuus", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Web-sovelluksen haavoittuvuustestauksen automatisointi", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202012177212", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "602", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "automaatio", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "testaus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "skannaus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "hakkerit", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
id jyx.123456789_73278
language fin
last_indexed 2025-02-18T10:56:27Z
main_date 2020-01-01T00:00:00Z
main_date_str 2020
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/22e30ccb-6063-45a1-9851-feca30f32279\/download","text":"URN:NBN:fi:jyu-202012177212.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2020
record_format qdc
source_str_mv jyx
spellingShingle Jokela, Patrik Web-sovelluksen haavoittuvuustestauksen automatisointi haavoittuvuustestaus hakkerointi automatisointi tietoturvallisuus Tietotekniikka Mathematical Information Technology 602 tietoturva automaatio testaus skannaus hakkerit
title Web-sovelluksen haavoittuvuustestauksen automatisointi
title_full Web-sovelluksen haavoittuvuustestauksen automatisointi
title_fullStr Web-sovelluksen haavoittuvuustestauksen automatisointi Web-sovelluksen haavoittuvuustestauksen automatisointi
title_full_unstemmed Web-sovelluksen haavoittuvuustestauksen automatisointi Web-sovelluksen haavoittuvuustestauksen automatisointi
title_short Web-sovelluksen haavoittuvuustestauksen automatisointi
title_sort web sovelluksen haavoittuvuustestauksen automatisointi
title_txtP Web-sovelluksen haavoittuvuustestauksen automatisointi
topic haavoittuvuustestaus hakkerointi automatisointi tietoturvallisuus Tietotekniikka Mathematical Information Technology 602 tietoturva automaatio testaus skannaus hakkerit
topic_facet 602 Mathematical Information Technology Tietotekniikka automaatio automatisointi haavoittuvuustestaus hakkerit hakkerointi skannaus testaus tietoturva tietoturvallisuus
url https://jyx.jyu.fi/handle/123456789/73278 http://www.urn.fi/URN:NBN:fi:jyu-202012177212
work_keys_str_mv AT jokelapatrik websovelluksenhaavoittuvuustestauksenautomatisointi