all InfoSec news
Offensive AI: Enhancing Directory Brute-forcing Attack with the Use of Language Models
April 23, 2024, 4:11 a.m. | Alberto Castagnaro, Mauro Conti, Luca Pajola
cs.CR updates on arXiv.org arxiv.org
Abstract: Web Vulnerability Assessment and Penetration Testing (Web VAPT) is a comprehensive cybersecurity process that uncovers a range of vulnerabilities which, if exploited, could compromise the integrity of web applications. In a VAPT, it is common to perform a \textit{Directory brute-forcing Attack}, aiming at the identification of accessible directories of a target website. Current commercial solutions are inefficient as they are based on brute-forcing strategies that use wordlists, resulting in enormous quantities of trials for a …
applications arxiv assessment attack brute compromise cs.cr cybersecurity directory exploited integrity language language models offensive penetration penetration testing process testing vapt vulnerabilities vulnerability vulnerability assessment web web applications web vulnerability
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
Social Engineer For Reverse Engineering Exploit Study
@ Independent study | Remote
Offensive Security Engineer
@ Ivanti | United States, Remote
Senior Security Engineer I
@ Samsara | Remote - US
Senior Principal Information System Security Engineer
@ Chameleon Consulting Group | Herndon, VA
Junior Detections Engineer
@ Kandji | San Francisco
Data Security Engineer/ Architect - Remote United States
@ Stanley Black & Decker | Towson MD USA - 701 E Joppa Rd Bg 700