{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T08:09:10Z","timestamp":1730275750151,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1109\/i-society.2014.7009066","type":"proceedings-article","created":{"date-parts":[[2015,1,21]],"date-time":"2015-01-21T14:37:10Z","timestamp":1421851030000},"page":"313-318","source":"Crossref","is-referenced-by-count":0,"title":["External footprinting security assessments: Combining the PTES framework with open-source tools to conduct external footprinting security assessments"],"prefix":"10.1109","author":[{"given":"Bruno","family":"Dinis","sequence":"first","affiliation":[]},{"given":"Carlos","family":"Serrao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Fuzzing: Brute force vulnerability discovery","author":"sutton","year":"2007","journal-title":"Pearson Education"},{"journal-title":"CVE - CVE List Main Page","year":"0","key":"17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/11508069_25"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1456625.1456634"},{"journal-title":"Nmap - Free Security Scanner for Network Exploration & Security Audits","year":"0","key":"16"},{"key":"13","first-page":"441","author":"faircloth","year":"2011","journal-title":"Penetration Tester's Open Source Toolkit"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2011.11.014"},{"journal-title":"Hostmap - The Automatic Hostnames and Virtual Hosts Discovery Tool","year":"2013","key":"11"},{"key":"12","first-page":"378","author":"jaswal","year":"2014","journal-title":"Mastering Metasploit"},{"journal-title":"A Guide to Discovering Web Application Insecurities Before Attackers Do SANS Institute","year":"2005","author":"williams","key":"3"},{"journal-title":"The Art of War","year":"2013","author":"tzu","key":"20"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/DeSE.2010.49"},{"journal-title":"The Penetration Testing Execution Standard","year":"2012","key":"1"},{"journal-title":"Netcraft | Internet Research Anti-phishing and PCI Security Services","year":"2013","key":"10"},{"key":"7","first-page":"52","article-title":"Practical aspects of vulnerability assessment and penetration testing","volume":"85","author":"lanz","year":"2003","journal-title":"The RMA Journal"},{"journal-title":"Internet Archive Digital Library of Free Books Movies Music & Wayback Machine","year":"0","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(09)70025-X"},{"journal-title":"Footprinting Encored","year":"2011","author":"e-cqurity","key":"4"},{"journal-title":"How Does the Reverse DNS work?","year":"2013","key":"9"},{"journal-title":"ZoneTransfer me - DigiNinja","year":"2013","key":"8"}],"event":{"name":"2014 International Conference on Information Society (i-Society)","start":{"date-parts":[[2014,11,10]]},"location":"London, United Kingdom","end":{"date-parts":[[2014,11,12]]}},"container-title":["International Conference on Information Society (i-Society 2014)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6994955\/7008990\/07009066.pdf?arnumber=7009066","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T21:29:30Z","timestamp":1490304570000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7009066\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/i-society.2014.7009066","relation":{},"subject":[],"published":{"date-parts":[[2014,11]]}}}