UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 5 | May 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 6 Issue 6
June-2019
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR1907C89


Registration ID:
221470

Page Number

935-940

Share This Article


Jetir RMS

Title

Vulnerability Assessment and Penetration Testing Tools Analysis and Implementation

Authors

Abstract

Abstract: penetration testing is a method of reaching a vulnerable system and web application. An attacker can take advantage of vulnerability can get access to the vulnerable system. An attacker can execute or generate the exploit for the vulnerable system or application. In the paper, we are an analysis of the penetration testing tools and also developing script (Tool) that can give the full access of any remote machine or victim machine. For penetration testing, we have a standard model which called open web Application security project (OWASP) top 10. Using this model we can do manual and automated penetration testing. OWASP top consists of the top 10 vulnerability like injection, broken authentication, broken access control, XSS, cross-site request forgery, misconfiguration, buffer over, etc. In the IT Organization, there are many tools which are available based on free and premium. Sometimes free tools also perform accurate result. So we analysis which tools we should use. We should use free or premium tools for assessment or penetration testing. Selecting the best tools it is also very difficult to work. Because for the same testing there are many or more tools available.

Key Words

Index Terms: Penetration testing, vulnerability assessment, tools, injection, analysis, script, and premium. Cross site request forgery, misconfiguration, and authentication. Buffer over flow, injection, OWASP exploit, web application.

Cite This Article

"Vulnerability Assessment and Penetration Testing Tools Analysis and Implementation", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.6, Issue 6, page no.935-940, June 2019, Available :http://www.jetir.org/papers/JETIR1907C89.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Vulnerability Assessment and Penetration Testing Tools Analysis and Implementation", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.6, Issue 6, page no. pp935-940, June 2019, Available at : http://www.jetir.org/papers/JETIR1907C89.pdf

Publication Details

Published Paper ID: JETIR1907C89
Registration ID: 221470
Published In: Volume 6 | Issue 6 | Year June-2019
DOI (Digital Object Identifier):
Page No: 935-940
Country: Seoni, MP, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0002827

Print This Page

Current Call For Paper

Jetir RMS