Penetration testing: Vulnerability analysis in a virtual environment

C. V. Arjun

Research output: Contribution to journalArticle

Abstract

Nowadays, it is common to hear about security breaches in all parts of the world, whose intensity may be big or small or it may take place in public or in private sector. Because of world wide web, all are connected. And that means systems are exposed to vulnerability. In order to reduce the risk of security breach, the application has to be rigorously tested before it can be accessed by malicious users through the internet. And here arises the role of the penetration tester to check for any vulnerabilities in the application or system. All the security testing's are done in the virtual lab which is built by using virtual box which avoids the need to buy racks of computers and other networking equipment's to perform testing. Virtual lab makes sure no testing activities reach world wide web which prevents testing activities accidentally becoming illegal activities. This is an important consideration in ethical penetration testing or pen test. The goal of penetration testing is to better protect the resources which are at the disposal. This study focuses on the vulnerability analysis phase of the penetration testing. The experiment is carried out using different tools like Nikto, Vega, Nmap and DNSenum in Kali Linux platform wherein vulnerabilities are identified and the results are displayed.

Original languageEnglish
Pages (from-to)8723-8729
Number of pages7
JournalJournal of Engineering and Applied Sciences
Volume12
Issue numberSpecialissue9
DOIs
Publication statusPublished - 01-01-2017
Externally publishedYes

Fingerprint

Virtual reality
Testing
World Wide Web
Internet
Experiments

All Science Journal Classification (ASJC) codes

  • Engineering(all)

Cite this

@article{053d6a71027543cdbb299fb7e099d21e,
title = "Penetration testing: Vulnerability analysis in a virtual environment",
abstract = "Nowadays, it is common to hear about security breaches in all parts of the world, whose intensity may be big or small or it may take place in public or in private sector. Because of world wide web, all are connected. And that means systems are exposed to vulnerability. In order to reduce the risk of security breach, the application has to be rigorously tested before it can be accessed by malicious users through the internet. And here arises the role of the penetration tester to check for any vulnerabilities in the application or system. All the security testing's are done in the virtual lab which is built by using virtual box which avoids the need to buy racks of computers and other networking equipment's to perform testing. Virtual lab makes sure no testing activities reach world wide web which prevents testing activities accidentally becoming illegal activities. This is an important consideration in ethical penetration testing or pen test. The goal of penetration testing is to better protect the resources which are at the disposal. This study focuses on the vulnerability analysis phase of the penetration testing. The experiment is carried out using different tools like Nikto, Vega, Nmap and DNSenum in Kali Linux platform wherein vulnerabilities are identified and the results are displayed.",
author = "Arjun, {C. V.}",
year = "2017",
month = "1",
day = "1",
doi = "10.3923/jeasci.2017.8723.8729",
language = "English",
volume = "12",
pages = "8723--8729",
journal = "Journal of Engineering and Applied Sciences",
issn = "1816-949X",
publisher = "Medwell Journals",
number = "Specialissue9",

}

Penetration testing : Vulnerability analysis in a virtual environment. / Arjun, C. V.

In: Journal of Engineering and Applied Sciences, Vol. 12, No. Specialissue9, 01.01.2017, p. 8723-8729.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Penetration testing

T2 - Vulnerability analysis in a virtual environment

AU - Arjun, C. V.

PY - 2017/1/1

Y1 - 2017/1/1

N2 - Nowadays, it is common to hear about security breaches in all parts of the world, whose intensity may be big or small or it may take place in public or in private sector. Because of world wide web, all are connected. And that means systems are exposed to vulnerability. In order to reduce the risk of security breach, the application has to be rigorously tested before it can be accessed by malicious users through the internet. And here arises the role of the penetration tester to check for any vulnerabilities in the application or system. All the security testing's are done in the virtual lab which is built by using virtual box which avoids the need to buy racks of computers and other networking equipment's to perform testing. Virtual lab makes sure no testing activities reach world wide web which prevents testing activities accidentally becoming illegal activities. This is an important consideration in ethical penetration testing or pen test. The goal of penetration testing is to better protect the resources which are at the disposal. This study focuses on the vulnerability analysis phase of the penetration testing. The experiment is carried out using different tools like Nikto, Vega, Nmap and DNSenum in Kali Linux platform wherein vulnerabilities are identified and the results are displayed.

AB - Nowadays, it is common to hear about security breaches in all parts of the world, whose intensity may be big or small or it may take place in public or in private sector. Because of world wide web, all are connected. And that means systems are exposed to vulnerability. In order to reduce the risk of security breach, the application has to be rigorously tested before it can be accessed by malicious users through the internet. And here arises the role of the penetration tester to check for any vulnerabilities in the application or system. All the security testing's are done in the virtual lab which is built by using virtual box which avoids the need to buy racks of computers and other networking equipment's to perform testing. Virtual lab makes sure no testing activities reach world wide web which prevents testing activities accidentally becoming illegal activities. This is an important consideration in ethical penetration testing or pen test. The goal of penetration testing is to better protect the resources which are at the disposal. This study focuses on the vulnerability analysis phase of the penetration testing. The experiment is carried out using different tools like Nikto, Vega, Nmap and DNSenum in Kali Linux platform wherein vulnerabilities are identified and the results are displayed.

UR - http://www.scopus.com/inward/record.url?scp=85047450894&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85047450894&partnerID=8YFLogxK

U2 - 10.3923/jeasci.2017.8723.8729

DO - 10.3923/jeasci.2017.8723.8729

M3 - Article

AN - SCOPUS:85047450894

VL - 12

SP - 8723

EP - 8729

JO - Journal of Engineering and Applied Sciences

JF - Journal of Engineering and Applied Sciences

SN - 1816-949X

IS - Specialissue9

ER -