Page 195 - ICDEBI2018
P. 195

I International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456nternational Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 | IF: 4.101

        3.   CONCLUSIONS                                        5.   REFERENCES
        A  network  will  ne'er  be  utterly  secure.  A  Pen  tester A  network  will  ne'er  be  utterly  secure.  A  Pen  tester  1.  Chan  Tuck  Wai  “Conducting  a  Penetration  Test Chan  Tuck  Wai  “Conducting  a  Penetration  Test
        ought to have the data of however a hacker can work ought to have the data of however a hacker can work   on an Organization”
        to  penetrate  the  network  by  finding  new  loop  holes to  penetrate  the  network  by  finding  new  loop  holes
                                                                                    Chow how
                                                                         Edward dward
                                                                                              “
                                                                                                           T
                                                                2.  C. C.   E       C         “Penetrate Penetrate   Testing”. esting”.
        and  vulnerabilities.  There  square  measure  zero.  There  square  measure  zero-day
                                                                   h
                                                                   http://www.coursehero.com/file/2835086/penetratttp://www.coursehero.com/file/2835086/penetrat
        attacks that return up daily. The network ought tattacks that return up daily. The network ought to be
                                                                   eTest/
        totally patched with the newest OS and therefore the totally patched with the newest OS and therefore the
        patches  for  the  software  package  put  in.  Penetration patches  for  the  software  package  put  in.  Penetration  3.  Anand  Sudula,  SSA  Global  Technologies  “ Anand  Sudula,  SSA  Global  Technologies  “
                                                                                                           Testing”. esting”.
                                                                   P
        take a look at ought to be frequently performed. take a look at ought to be frequently performed. each   Penetration enetration   T
        quarterly  could  be  a  recommended  period  of  your mended  period  of  your   http://www.docstoc.com/docs/36432625/Penetrati/www.docstoc.com/docs/36432625/Penetrati
        time for a perfect pen take a look at. [3]                 on-Testing-Penetration-TestingTesting-Anand-Sudula-
                                                                   CISA-CISSP-SSA-Global--Technologies
        Amidst varied constraints like lack of your time and ike lack of your time and   4.  Hemil  Shah  “Writing  NASL  Scripts”  URL: Hemil  Shah  “Writing  NASL  Scripts”  URL:
        improper  definition  of  scope  of  the  project, per  definition  of  scope  of  the  project,
                                                                   http://www.infosecwriters.com/text_resources/pdfttp://www.infosecwriters.com/text_resources/pdf
                                                                   h
        penetration take a look ater has got to perform the test penetration take a look ater has got to perform the test   /NASL_HShah.pdf
        to the most effective of the potency by creating use of to the most effective of the potency by creating use of
        the  tools  well.  it's  higher  to  own  tiny  autothe  tools  well.  it's  higher  to  own  tiny  automation   5.  Nmap download URL: http://www.nmNmap download URL: http://www.nmap.org
        scripts for time intense tasks.                         6.  Nessus Nessus       download ownload       URL: RL:
                                                                                                               U
                                                                                        d
                                                                   http://www.tenable.com/products/nessus ttp://www.tenable.com/products/nessus
                                                                   h
        4.   FUTURE SCOPE
                                                                                                               U
        Hackers  square  measure  finding  a  lot  of  and  other Hackers  square  measure  finding  a  lot  of  and  other   7.  Owasp Owasp   URL: RL:
                                                                   https://www.owasp.org/index.php/OWASP_Risk_ttps://www.owasp.org/index.php/OWASP_Risk_
                                                                   h
        ways  everyday  to  penetrate  through  the  network. ways  everyday  to  penetrate  through  the  network.
        There square measure Zero-day attacks which require day attacks which require   Rating_Methodology
        heap of your time and new tools to be discovered heap of your time and new tools to be discovered to  8.  Timothy P.  Layton, Sr. “Penetration St. “Penetration Studies – A
        safe guard the network. There’s a demand to develop a demand to develop   Technical nical   Overview”. verview”.   U
                                                                                        O
                                                                                                               URL: RL:
        new penetration testing tools, than looking forward to new penetration testing tools, than looking forward to   http://www.sans.org/readingttp://www.sans.org/reading-
                                                                   h
                                                                   r
        the  present  previous  ones.  New  methodologies  and the  present  previous  ones.  New  methodologies  and   room/whitepapers/testing/penetrationoom/whitepapers/testing/penetration-studies-
        processes  square  measure  to  be  discesses  square  measure  to  be  discovered  and   technical-overview-267
        enforced  to  create  the  penetration  testing  a  lot  ofenforced  to  create  the  penetration  testing  a  lot  of
                                                                9.  SANS  Institute  Info  Sec  Reading  Room  ” Sec  Reading  Room  ”
        complete.
                                                                   Penetration  Testing:  The  Third  Party  Hacker  ” enetration  Testing:  The  Third  Party  Hacker  ”
                                                                   P

                                                                   URL:                 h
                                                                                        http://www.sans.org/readingttp://www.sans.org/reading-

                                                                   room/whitepapers/testing/penetrationoom/whitepapers/testing/penetration-testing-
                                                                   r
                                                                   third-party-hacker-264



























        @ IJTSRD  |  Available Online @ www.ijtsrd.comwww.ijtsrd.com |  Conference Issue: ICDEBI-2018 | | Oct 2018   Page: 187
   190   191   192   193   194   195   196   197   198   199   200