IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY A DESCRIPTIVE REVIEW OF DIFFERENT PENETRATION TESTING TOOLS AND METHODS

The penetration testing is to authenticate a recently discovered and approachable applications and networks, structure that are vulnerable to a certainty harm ,expose to danger and security risk which could reveal unauthorized access to resources. Penetration testing is a series of actions or steps to reproduce all methods taken by attackers to obtain a system. A penetration tester is the attested , programmed and effective technique used to find the vulnerabilities in an attempt to accomplish an interruption into host, network or application resources. The penetration testing can determine the internal and external resources. In this paper we implement an nmap, cain, abel, wireshark penetration testing tools that examine the vulnerabilities such as a open ,close ports and also the method to penetrate a individual operating system . Security professionals across the globe usually address these security risks by Vulnerability Assessment and Penetration Testing (VAPT).

[1]  Sven Türpe,et al.  Testing Production Systems Safely: Common Precautions in Penetration Testing , 2009, 2009 Testing: Academic and Industrial Conference - Practice and Research Techniques.

[2]  Alessandro Orso,et al.  Penetration Testing with Improved Input Vector Identification , 2009, 2009 International Conference on Software Testing Verification and Validation.

[3]  James P. McDermott,et al.  Attack net penetration testing , 2001, NSPW '00.

[4]  Dawu Gu,et al.  An Easy-to-Deploy Penetration Testing Platform , 2008, 2008 The 9th International Conference for Young Computer Scientists.

[5]  Wang LanFang,et al.  A Research of Behavior-Based Penetration Testing Model of the Network , 2012, 2012 International Conference on Industrial Control and Electronics Engineering.

[6]  Konstantinos Xynos,et al.  Penetration Testing and Vulnerability Assessments: A Professional Approach , 2010 .