Security Implementation Using Penetration Testing

  • Aswathy Mohan, G. Aravind Swaminathan, Anatol Degefa Kubsa, Fikadu Tesgera Tolasa, Mihretab Tesfayohanis, Gadisa Kana Bakala

Abstract

Cybersecurity has become an inevitable technology in today’s world. One of the effective and most widely used preventive technique for hacking is known to be Penetration Testing or Pen Testing. This technique of cyber-attack is performed legally to find the vulnerabilities of a system or organization.  Penetration Testing is an important tool in Cybersecurity used for the security of networks. It is a licensed cyber-attack on an organization's system to check the security. In this testing Kali  Linux OS and python language is used. because kali provides all necessary tools for implementing pen testing. For penetration testing a set of pen testers will be performing the task. In this paper we are going to analyze the methodologies in pen testing by testing using the tools in kali linux platform and by using python language. In this research we will be analyzing the efficiency of each tools used for testing the target system . Pen testing is the process by which all systems are properly designed to prevent unauthorized access. Security Vulnerability is actually the weaknesses of a system which led to security threat. Vulnerability assessment is the method of testing the target system to identify the vulnerabilities. Pen testing identifies the vulnerabilities by simulating an attack. This report focusing on the various phases of pen testing and the efficiency of tools in kali linux. After getting access to the system the pen tester creates a report which contains the security loopholes by which a hacker can hack the system. This research can be divided into two sub sections. First section involves an introduction to pen testing and the phases and methodologies used. Second section illustrates a target system examples for web penetration testing and finally we will conclude the results. In the detailed description of Pentesting on target systems Mr. Robot,i will be explaining the steps from beginning till we access the root user privileges in those systems. Identifying IP address , scanning for open ports, Bruteforcing directory and passwords, using tools like burp suite and finding final flag of root user through which we will gain root user privileges. Using networking and python server to transfer special files to gain access. Use of special commands and codes to penetrate to the target system to achieve the privileges and identifying security vulnerabilities through which we can initiate attack

Published
2021-10-19
How to Cite
Aswathy Mohan, G. Aravind Swaminathan, Anatol Degefa Kubsa, Fikadu Tesgera Tolasa, Mihretab Tesfayohanis, Gadisa Kana Bakala. (2021). Security Implementation Using Penetration Testing. Design Engineering, 5408-5421. Retrieved from http://thedesignengineering.com/index.php/DE/article/view/5493
Section
Articles