Analysis of Penetration Testing Tools

Palak Aar, Aman Kumar Sharma

Abstract


Penetration testing is defined as the procedure of imposing as an attacker to find out the vulnerabilities in a system that can be used to gain access to system for malicious use. This paper provides an overview of penetration testing and list out the criteria used to select the best tools for the given purpose. It also provides a brief description of the selected tools and furthermore we compare those tools. The results of the comparison are shown in terms of graphs and tables.

Full Text:

PDF

References


Georgia Weidman, Penetration Testing - A Hands-On Introduction To hacking, No Starch Press, 2014, isbn: 978-1-59327-564-8.

Rahmat Budiarto, Ramadass Sureswaran, Sureswaran Ramadass, Azman Samsudin, Salah Noor, Development of Penetration Ttesting Model for Increasing Network Security, Information and Communication Technologies: From Theory to Applications, 2004, isbn:0-7803-8482-2.

Stephen Fried, Introduction Tto Penetration Testing, Auerbach Publications, 2000.

Arpita Tewai, Arun Misra, Evaluation and Taxonomy of PenetrationTtesting, International Journal on Recent and Innovation Trends in Computing and Communication, vol: 3, no. 8, 2015, issn: 2321-8169.

Sumit Kumar, Sithu D. Sudarsan, An Innovative UDP Port Scanning Technique, International Journal of Future Computer and Communication , vol. 3, no. 6, 2014.

Monowar H. Bhuyan, D.K. Bhattacharyya, and J.K. Kalita, Surveying Port Scans and Their Detection Methodologies, The Computer Journal Advance Access, vol. 54 , no. 10, 2011.

Robert F. Erbacher, visual traffic monitoring and evaluation in proceedings of the conference on Internet Performance and Control of Network Systems II, pp 153–160, 2001.

G. F. Lyon, nmap network scanning: the official nmap project guide to network discovery and security scanning. Insecure, 2009.

Aileen G. Bacudio, Xiaohong Yuan, Bei-Tseng Bill Chu, Monique Jones, An Overview Of Penetration Testing, International Journal of Network Security & its Applications, vol. 3, no. 6, 2011.

Konstantinos Xynos, Iain Sutherland, Huw Read, Emlyn Everitt and Andrew J.C. Blyth, Penetration Testing And Vulnerability Assessments: A Professional Approach , International Cyber Resilience conference,2010.

Filip Holik, Josef Horalek, Ondrej Marik, Sona Neradova, Stanislav Zitta, Effective penetration testing with Metasploit framework and methodologies ,15th ieee International Symposium on Computational Intelligence and Informatics,2014.

Sheetal Bairwa, Bhawna Mewara and Jyoti Gajrani, Vulnerability Scanners: A Proactive Approach To Assess Web Application Security , International Journal on Computational Sciences & Applications, vol.4, no.1, 2014.

Cynthia Bailey Lee, Chris Roedel and Elena Silenok, Detection and Characterization of Port Scan Attacks, univeristy of california, department of computer science and engineering (2003).

Rajwinder Kaur, Gurjot singh, Analysing Port Scanning Tools and Security Techniques, International Journal of Electrical Electronics & Computer Science Engineering, vol. 1, issue 5, 2014, issn : 2348 2273.

Marri Rami Reddy, Dr. PrashanthYalla, Mathematical Analysis of Penetration Testing and Vulnerability Countermeasures, 2nd ieee International Conference on Engineering and Technology , 2016.




DOI: https://doi.org/10.23956/ijarcsse.v7i9.408

Refbacks

  • There are currently no refbacks.




© International Journals of Advanced Research in Computer Science and Software Engineering (IJARCSSE)| All Rights Reserved | Powered by Advance Academic Publisher.