Penetration Testing: Vulnerability Analysis in a Virtual Environment

Arjun, C V (2018) Penetration Testing: Vulnerability Analysis in a Virtual Environment. Journal of Engineering and Applied Sciences, 12 (9). pp. 8723-8729. ISSN 1819-6608

[img] PDF
5045.pdf - Published Version
Restricted to Registered users only

Download (1MB) | Request a copy


Nowadays it is common to hear about security breaches in all parts of the world, whose intensity may be big or small or it may take place in public or in private sector. Because of World Wide Web, all are connected. And that means systems are exposed to vulnerability. In order to reduce the risk of security breach, the application has to be rigorously tested before it can be accessed by malicious users through the internet. And here arises the role of the penetration tester to check for any vulnerabilities in the application or system. All the security testing’s are done in the virtual lab which is built by using Virtual Box, which avoids the need to buy racks of computers and other networking equipment’s to perform testing. Virtual lab makes sure no testing activities reach World Wide Web, which prevents testing activities accidentally becoming illegal activities. This is an important consideration in ethical penetration testing, or pen test. The goal of penetration testing is to better protect the resources which are at the disposal. This paper focuses on the vulnerability analysis phase of the penetration testing. The experiment is carried out using different tools like nikto, vega, nmap and dnsenum in Kali Linux platform wherein vulnerabilities are identified and the results are displayed.

Item Type: Article
Uncontrolled Keywords: Penetration Testing, Vulnerability Analysis, Kali Linux, Virtual Lab, Security
Subjects: Engineering > MIT Manipal > Information and Communication Technology
Depositing User: MIT Library
Date Deposited: 19 Oct 2018 08:46
Last Modified: 19 Oct 2018 08:46

Actions (login required)

View Item View Item