Skip to content
Blog Tag banner image
OpenTAP and Security Testing IV - Wireless Security

Wireless network security testing involves evaluating the security measures and protocols of a wireless network to identify vulnerabilities and ensure the network is protected against unauthorized access and attacks. The testing process typically includes several steps and techniques, and so benefit greatly from test automation with OpenTAP

Read more
OpenTAP and Security Testing II - Vulnerability Assessment

This second blog in our series on using OpenTAP for security testing, we take a deep dive into Vulnerability Assessment.

A software vulnerability describes a weakness or flaw in a software system that can be exploited by attackers to compromise the security of the system, its data, or its users. Vulnerabilities can exist in various components of software, including operating systems, drivers, applications, libraries, and firmware.

Read more
Building and Running OpenTAP on ARM-based Systems

This blog demonstrates how hosting the OpenTAP test automation engine itself on ARM-based systems is a relatively straightforward task. Since OpenTAP is built with .NET, it enjoys the hardware abstraction provided by the Microsoft application framework, with very few hardware-specific dependencies or idiosyncrasies. As examples, the blog shows how to target an Apple M1 host running Ubuntu Linux, an ARM64-based Raspberry Pi system, and an M1 Pro-based MacBook Pro running MacOS.

Read more