• A penetration test, colloquially known as a pentest, is an authorized simulated cyberattack on a computer system, performed to evaluate the security of...
    29 KB (3,516 words) - 18:08, 13 July 2025
  • Thumbnail for Standard penetration test
    The standard penetration test (SPT) is an in-situ dynamic penetration test designed to provide information on the geotechnical engineering properties...
    10 KB (1,302 words) - 00:21, 30 November 2024
  • Thumbnail for Cone penetration test
    The cone penetration or cone penetrometer test (CPT) is a method used to determine the geotechnical engineering properties of soils and delineating soil...
    9 KB (1,102 words) - 03:17, 16 April 2025
  • White-box testing (also known as clear box testing, glass box testing, transparent box testing, and structural testing) is a method of software testing that...
    12 KB (1,573 words) - 10:37, 22 March 2025
  • hamster zona-free ovum test (HZFO test), or hamster egg-penetration test, or sometimes just hamster test, is an in-vitro test used to study physiological...
    7 KB (774 words) - 17:36, 18 September 2023
  • system and acceptance. Black-box testing is also used as a method in penetration testing, where an ethical hacker simulates an external hacking or cyber warfare...
    7 KB (821 words) - 20:43, 16 June 2025
  • Thumbnail for Rockwell hardness test
    Rockwell hardness test is a hardness test based on indentation hardness of a material. The Rockwell test measures the depth of penetration of an indenter...
    16 KB (1,654 words) - 10:27, 2 June 2025
  • Thumbnail for Kali Linux
    digital forensics and penetration testing. It is maintained and funded by Offensive Security. The software is based on the DebianTesting branch: most packages...
    27 KB (2,228 words) - 02:37, 11 July 2025
  • California bearing ratio (category Tests in geotechnical laboratories)
    using a standardized penetration test first developed by the California Division of Highways for highway engineering. Empirical tests measure the strength...
    5 KB (656 words) - 00:54, 5 December 2024
  • Ethical hacking is a term meant to imply a broader category than just penetration testing. Under the owner's consent, white-hat hackers aim to identify any...
    18 KB (1,870 words) - 03:36, 6 June 2025
  • the systems under test but not the depth of exposure that a specific vulnerability could lead to. Penetration Test - Penetration test simulates an attack...
    8 KB (1,008 words) - 14:11, 21 November 2024
  • certification offered by Offensive Security (or OffSec) that teaches penetration testing methodologies and the use of the tools included with the Kali Linux...
    16 KB (1,285 words) - 08:50, 16 November 2024
  • Thumbnail for Soil liquefaction
    (Fear) (1998). "Evaluating cyclic liquefaction potential using the cone penetration test". Canadian Geotechnical Journal. 35 (3): 442–59. Bibcode:1998CaGJ....
    31 KB (3,666 words) - 16:31, 24 May 2025
  • Thumbnail for Geotechnical engineering
    usually involves in-situ testing (for example, the standard penetration test and cone penetration test). The digging of test pits and trenching (particularly...
    25 KB (2,761 words) - 12:01, 7 July 2025
  • security for non-malicious reasons, either to test their own security system, perform penetration tests or vulnerability assessments for a client, or...
    55 KB (5,962 words) - 03:26, 11 June 2025
  • computational cost and effort. Vulnerability assessment and penetration testing are two different testing methods. They are differentiated on the basis of certain...
    5 KB (463 words) - 22:36, 18 July 2024
  • worked penetration values, measured using the test defined by standard ASTM D217 “cone penetration of lubricating grease”. This involves two test apparatus...
    5 KB (499 words) - 16:59, 14 August 2024
  • Red team (redirect from Red team testing)
    organization is aware of the penetration test and is ready to mount a defense. A red team goes a step further, and adds physical penetration, social engineering...
    45 KB (5,495 words) - 07:43, 27 June 2025
  • testing, functional testing, security testing, penetration testing, and validation testing. Artificial intelligence (AI) used in API testing improves the efficiency...
    12 KB (1,266 words) - 10:01, 14 February 2025
  • Thumbnail for Earthquake
    induced by human activities, such as mining, fracking, and nuclear weapons testing. The initial point of rupture is called the hypocenter or focus, while...
    79 KB (8,543 words) - 10:17, 27 May 2025
  • Thumbnail for BackBox
    BackBox is a penetration test and security assessment oriented Ubuntu-based Linux distribution providing a network and informatic systems analysis toolkit...
    10 KB (611 words) - 14:37, 22 April 2025
  • Offensive Security (category Software testing)
    American international company working in information security, penetration testing and digital forensics. Beginning around 2007, the company created...
    23 KB (1,565 words) - 06:09, 23 April 2025
  • easily identified using X-ray diffraction rather than chemical or physical tests. Varve (or varved clay) is clay with visible annual layers that are formed...
    30 KB (3,423 words) - 10:29, 26 June 2025
  • Thumbnail for Mass wasting
    Field (in situ) Core drill Cone penetration test Geo-electrical sounding Permeability test Load test Static Dynamic Statnamic Pore pressure measurement...
    21 KB (2,451 words) - 00:00, 30 June 2025
  • Thumbnail for Thixotropy
    Field (in situ) Core drill Cone penetration test Geo-electrical sounding Permeability test Load test Static Dynamic Statnamic Pore pressure measurement...
    12 KB (1,457 words) - 14:49, 23 May 2025
  • tenants, following penetration testing rules of engagement step-by-step is a mandatory requirement. Scanning and penetration testing from inside or outside...
    53 KB (6,653 words) - 07:07, 25 June 2025
  • Vulnerability (computer security) (category Software testing)
    the software. A penetration test attempts to enter the system via an exploit to see if the system is insecure. If a penetration test fails, it does not...
    27 KB (3,333 words) - 03:19, 9 June 2025
  • connect customers with freelance security researchers who conduct penetration testing to identify vulnerabilities. Established in 2013 by former NSA agents...
    9 KB (655 words) - 16:43, 3 March 2025
  • Thumbnail for Kali NetHunter
    Kali NetHunter is a free and open-source mobile penetration testing platform for Android devices, based on Kali Linux. Kali NetHunter is available for...
    12 KB (1,053 words) - 02:44, 6 May 2025
  • Certified Penetration Testing Engineer (C)PTE) is an internationally recognized cyber security certification administered by the United States–based information...
    3 KB (265 words) - 15:06, 29 September 2024