International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020


IJSTR >> Volume 6 - Issue 6, June 2017 Edition

International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616

Penetration Testing In System Administration

[Full Text]



Muhammad Zunnurain Hussain, Muhammad Zulkifl Hasan, Muhammad Taimoor Aamer Chughtai



OS Operating System, Dos Denial of Service.



In this paper, Authors will be discussing the penetration testing in system administration and challenges faced by the industry in securing the data and information using different techniques. Penetration Testing is modern technique of assessing the vulnerabilities in the system. It has been performed to explore all the loop holes in the system and the tester behave like an attacker. All the potential weaknesses, access to data manually or automatically being checked and verifies by the tester. The purpose of this activity is to gather all the required information to secure the data before real attack effects the system, during the process port scanning and other activities were performed and finally as report will be made to suggest improvement in the system to secure it. It is very challenging these days to secure the communication between two users although people use different encryption techniques [1].



[1]. A. G. Bacudio et al, "An overview of penetration testing," International Journal of Network Security & its Applications, vol. 3, pp. 19, 2011.

[2]. W. G. Halfond, S. R. Choudhary and A. Orso, "Penetration testing with improved input vector identification," in 2009 International Conference on Software Testing Verification and Validation, 2009, pp. 346-355.

[3]. J. Hoffmann et al, "SAT encodings of state-space reachability problems in numeric domains." in Ijcai, 2007, pp. 1918-1923.

[4]. H. Nakhost, J. Hoffmann and M. Müller, "Resource-constrained planning: A monte carlo random walk approach," in 22nd International Conference on Automated Planning and Scheduling (ICAPS), 2012, .

[5]. I. Arce and G. McGraw, "Guest editors' introduction: Why attacking systems is a good idea," IEEE Security & Privacy, vol. 2, pp. 17-19, 2004.

[6]. A. E. Gerevini, A. Saetti and I. Serina, "An approach to efficient planning with numerical fluents and multi-criteria plan quality," Artif. Intell., vol. 172, pp. 899-944, 2008.

[7]. P. Halsum and H. Geffner, "Heuristic planning with time and resource," in IJCAI Workshop on Planning with Resources, Seattle, USA, 2001, .

[8]. M. Steinmetz, "Critical constrained planning and an application to network penetration testing," in The 26th International Conference on Automated Planning and Scheduling, 2016, pp. 141.

[9]. J. Hoffmann and M. Fickert, Explicit Conjunctions W/O Compilation: Computing hFF (Πc) in Polynomial Time (Technical Report), 2015.

[10]. P. P. Shimpi and M. S. Nagpure, "Decentralized Virtual VAPT Laboratory Model," Global Journal for Research Analysis, vol. 4, 2016.

[11]. L. Vishnoi and V. Shrivastava, "Results of Penetration Testing on Various Operating Systems," .

[12]. (2001). Penetration Tests: The Baseline For Effective Information Protection Available: http://www.iss.net/documents/whitepapers/pentestwp.pdf. DOI: 14-12-2016.

[13]. (2014). Penetration Testing. Available: https://www.depts.ttu.edu/cs/research/csecs/workshop/docs/.../Petetration-Testing.ppt. DOI: 14-12-2016.