UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 5 | May 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 5 Issue 7
July-2018
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR1807252


Registration ID:
184863

Page Number

9-14

Share This Article


Jetir RMS

Title

Assessment of Vulnerability and Network Security by Penetration Testing

Abstract

Now a days, information security is very important, because more and more confidential information is being stored electronically on computer systems and those systems are often connected to computer networks. This brings new challenges for employees working in sector of information technology. They have to ensure that those systems are as much secure as possible and confidential information will not be leaked. One possible way how to prove security of systems is to conduct regular penetration tests – e.g. simulate attacker’s malicious activity. In this paper, we have discussed the process which involves an active analysis of the system for any potential vulnerabilities that could result from poor or improper system configuration, for hardware or software flaws and operational weaknesses in process or technical countermeasures. This assessment is carried out as an attacker and can involve active exploitation of security vulnerabilities. This process is known as Penetration Testing or PenTest. “PenTest is a process or a method of evaluating computer and network security by simulating an attack on a computer system or network from external or internal threats”. The role of this testing method is to identify and fix potential holes in order to stop or prevent attacks that can be harmful to the network or system. Here, we have created a laboratory setup replicating an organizational infrastructure to study penetration testing on real time server-client atmosphere. We have used some free and open source tools (Nmap, Nessus and Metasploit) techniques to simulate.

Key Words

Penetration Testing, GNS3, Kali Linux, Metasploit, Nmap, Nessus, smb, mcl

Cite This Article

"Assessment of Vulnerability and Network Security by Penetration Testing", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.5, Issue 7, page no.9-14, July-2018, Available :http://www.jetir.org/papers/JETIR1807252.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Assessment of Vulnerability and Network Security by Penetration Testing", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.5, Issue 7, page no. pp9-14, July-2018, Available at : http://www.jetir.org/papers/JETIR1807252.pdf

Publication Details

Published Paper ID: JETIR1807252
Registration ID: 184863
Published In: Volume 5 | Issue 7 | Year July-2018
DOI (Digital Object Identifier):
Page No: 9-14
Country: --, -, -- .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0002885

Print This Page

Current Call For Paper

Jetir RMS