Results of Penetration Testing on different Windows Client Operating Systems

Windows operating systems are very popular among people from common men to specialists also. We will be working on some operating systems in this paper. People out of there often select windows operating system as importance among several others. So are our information and data secured? To answer this we make use of penetration testing on window client operating system and test various exploits on windows operating system by using the kali Linux Operating system. Try to exploit operating system. Penetration tests provide evidence that vulnerabilities do exist as a result network penetrations are possible as well as any workstation vulnerability. They provide a blueprint for remediation. Methodology include: discovery, enumeration, vulnerability identification, vulnerability assessment, exploitation and launching of attack, reporting, external penetration testing, internal penetration testing, legal issues before you start.

[1]  Zhuhua Cai,et al.  Software Vulnerability Discovery Techniques: A Survey , 2012, 2012 Fourth International Conference on Multimedia Information Networking and Security.

[2]  Bradley S. Rubin,et al.  Computer Security Education and Research: Handle with Care , 2006, IEEE Security & Privacy.

[3]  S. Robinson The art of penetration testing , 2005 .

[4]  Charles C. Palmer,et al.  Ethical Hacking , 2019, CEH v10 Certified Ethical Hacker Study Guide.