A Process of Penetration Testing Using Various Tools

Main Article Content

Dr.K.Deepika kongara
Shivani Krishnama

Abstract

In the present world, information and data are the greatest assets one can possess. If one cannot secure their information from cyber-attacks, they would lose everything in the blink of an eye. Penetration testing can help reduce this cyber-risk exposure of clients' data and protect them. Penetration testing (also called "pen testing") is a part of ethical hacking that exposes the weak areas, vulnerabilities, or loopholes in the core of a PC, its networks, and its applications with the purpose of securing the system. The main idea of pen testing is to find vulnerabilities in systems and fix them before attackers can take advantage of them. These vulnerabilities are identified, exploited, and analyzed in five phases: information gathering, scanning, gaining access, maintaining access, and covering tracks. Penetration testing is done regularly in order to maintain high-security standards. As it pertains to any organization’s secrecy and privacy, this testing is also constrained by a number of legal agreements. The work provided by many researchers in the field of penetration (PEN) testing is reviewed and analyzed in this paper. This report gives a detailed description of the process and tools used to conduct penetration testing

Downloads

Download data is not yet available.

Article Details

How to Cite
kongara, D., & Krishnama, S. (2023). A Process of Penetration Testing Using Various Tools. Mesopotamian Journal of CyberSecurity, 2023, 93–103. https://doi.org/10.58496/MJCS/2023/014
Section
Articles