A Process of Penetration Testing Using Various Tools
Main Article Content
Abstract
In the present world, information and data are the greatest assets one can possess. If one cannot secure their information from cyber-attacks, they would lose everything in the blink of an eye. Penetration testing can help reduce this cyber-risk exposure of clients' data and protect them. Penetration testing (also called "pen testing") is a part of ethical hacking that exposes the weak areas, vulnerabilities, or loopholes in the core of a PC, its networks, and its applications with the purpose of securing the system. The main idea of pen testing is to find vulnerabilities in systems and fix them before attackers can take advantage of them. These vulnerabilities are identified, exploited, and analyzed in five phases: information gathering, scanning, gaining access, maintaining access, and covering tracks. Penetration testing is done regularly in order to maintain high-security standards. As it pertains to any organization’s secrecy and privacy, this testing is also constrained by a number of legal agreements. The work provided by many researchers in the field of penetration (PEN) testing is reviewed and analyzed in this paper. This report gives a detailed description of the process and tools used to conduct penetration testing
Downloads
Article Details
This work is licensed under a Creative Commons Attribution 4.0 International License.