Score: 0

A Comprehensive Evaluation and Practice of System Penetration Testing

Published: October 30, 2025 | arXiv ID: 2510.26555v1

By: Chunyi Zhang, Jin Zeng, Xiaoqi Li

Potential Business Impact:

Finds computer weaknesses before bad guys do.

Business Areas:
Penetration Testing Information Technology, Privacy and Security

With the rapid advancement of information technology, the complexity of applications continues to increase, and the cybersecurity challenges we face are also escalating. This paper aims to investigate the methods and practices of system security penetration testing, exploring how to enhance system security through systematic penetration testing processes and technical approaches. It also examines existing penetration tools, analyzing their strengths, weaknesses, and applicable domains to guide penetration testers in tool selection. Furthermore, based on the penetration testing process outlined in this paper, appropriate tools are selected to replicate attack processes using target ranges and target machines. Finally, through practical case analysis, lessons learned from successful attacks are summarized to inform future research.

Page Count
34 pages

Category
Computer Science:
Cryptography and Security