Page 195 - ICDEBI2018
P. 195
I International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456nternational Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 | IF: 4.101
3. CONCLUSIONS 5. REFERENCES
A network will ne'er be utterly secure. A Pen tester A network will ne'er be utterly secure. A Pen tester 1. Chan Tuck Wai “Conducting a Penetration Test Chan Tuck Wai “Conducting a Penetration Test
ought to have the data of however a hacker can work ought to have the data of however a hacker can work on an Organization”
to penetrate the network by finding new loop holes to penetrate the network by finding new loop holes
Chow how
Edward dward
“
T
2. C. C. E C “Penetrate Penetrate Testing”. esting”.
and vulnerabilities. There square measure zero. There square measure zero-day
h
http://www.coursehero.com/file/2835086/penetratttp://www.coursehero.com/file/2835086/penetrat
attacks that return up daily. The network ought tattacks that return up daily. The network ought to be
eTest/
totally patched with the newest OS and therefore the totally patched with the newest OS and therefore the
patches for the software package put in. Penetration patches for the software package put in. Penetration 3. Anand Sudula, SSA Global Technologies “ Anand Sudula, SSA Global Technologies “
Testing”. esting”.
P
take a look at ought to be frequently performed. take a look at ought to be frequently performed. each Penetration enetration T
quarterly could be a recommended period of your mended period of your http://www.docstoc.com/docs/36432625/Penetrati/www.docstoc.com/docs/36432625/Penetrati
time for a perfect pen take a look at. [3] on-Testing-Penetration-TestingTesting-Anand-Sudula-
CISA-CISSP-SSA-Global--Technologies
Amidst varied constraints like lack of your time and ike lack of your time and 4. Hemil Shah “Writing NASL Scripts” URL: Hemil Shah “Writing NASL Scripts” URL:
improper definition of scope of the project, per definition of scope of the project,
http://www.infosecwriters.com/text_resources/pdfttp://www.infosecwriters.com/text_resources/pdf
h
penetration take a look ater has got to perform the test penetration take a look ater has got to perform the test /NASL_HShah.pdf
to the most effective of the potency by creating use of to the most effective of the potency by creating use of
the tools well. it's higher to own tiny autothe tools well. it's higher to own tiny automation 5. Nmap download URL: http://www.nmNmap download URL: http://www.nmap.org
scripts for time intense tasks. 6. Nessus Nessus download ownload URL: RL:
U
d
http://www.tenable.com/products/nessus ttp://www.tenable.com/products/nessus
h
4. FUTURE SCOPE
U
Hackers square measure finding a lot of and other Hackers square measure finding a lot of and other 7. Owasp Owasp URL: RL:
https://www.owasp.org/index.php/OWASP_Risk_ttps://www.owasp.org/index.php/OWASP_Risk_
h
ways everyday to penetrate through the network. ways everyday to penetrate through the network.
There square measure Zero-day attacks which require day attacks which require Rating_Methodology
heap of your time and new tools to be discovered heap of your time and new tools to be discovered to 8. Timothy P. Layton, Sr. “Penetration St. “Penetration Studies – A
safe guard the network. There’s a demand to develop a demand to develop Technical nical Overview”. verview”. U
O
URL: RL:
new penetration testing tools, than looking forward to new penetration testing tools, than looking forward to http://www.sans.org/readingttp://www.sans.org/reading-
h
r
the present previous ones. New methodologies and the present previous ones. New methodologies and room/whitepapers/testing/penetrationoom/whitepapers/testing/penetration-studies-
processes square measure to be discesses square measure to be discovered and technical-overview-267
enforced to create the penetration testing a lot ofenforced to create the penetration testing a lot of
9. SANS Institute Info Sec Reading Room ” Sec Reading Room ”
complete.
Penetration Testing: The Third Party Hacker ” enetration Testing: The Third Party Hacker ”
P
URL: h
http://www.sans.org/readingttp://www.sans.org/reading-
room/whitepapers/testing/penetrationoom/whitepapers/testing/penetration-testing-
r
third-party-hacker-264
@ IJTSRD | Available Online @ www.ijtsrd.comwww.ijtsrd.com | Conference Issue: ICDEBI-2018 | | Oct 2018 Page: 187