"What if someone steals it?" - Hands-on evaluation of the software security work of a networked embedded system
As information technology has grown and evolved, so has the need of securing the information. It is important to evaluate both the security of systems and the methods which are used for the evaluation. One method for finding security vulnerabilities in a system is penetration testing. The goal of this thesis is to evaluate some tools and methods for penetration testing. The methods were examined