Penetration Testing In System Administration
[Full Text]
AUTHOR(S)
Muhammad Zunnurain Hussain, Muhammad Zulkifl Hasan, Muhammad Taimoor Aamer Chughtai
KEYWORDS
OS Operating System, Dos Denial of Service.
ABSTRACT
In this paper, Authors will be discussing the penetration testing in system administration and challenges faced by the industry in securing the data and information using different techniques. Penetration Testing is modern technique of assessing the vulnerabilities in the system. It has been performed to explore all the loop holes in the system and the tester behave like an attacker. All the potential weaknesses, access to data manually or automatically being checked and verifies by the tester. The purpose of this activity is to gather all the required information to secure the data before real attack effects the system, during the process port scanning and other activities were performed and finally as report will be made to suggest improvement in the system to secure it. It is very challenging these days to secure the communication between two users although people use different encryption techniques [1].
REFERENCES
REFERENCES
[1]. A. G. Bacudio et al, "An overview of penetration testing," International Journal of Network Security & its Applications, vol. 3, pp. 19, 2011.
[2]. W. G. Halfond, S. R. Choudhary and A. Orso, "Penetration testing with improved input vector identification," in 2009 International Conference on Software Testing Verification and Validation, 2009, pp. 346-355.
[3]. J. Hoffmann et al, "SAT encodings of state-space reachability problems in numeric domains." in Ijcai, 2007, pp. 1918-1923.
[4]. H. Nakhost, J. Hoffmann and M. Müller, "Resource-constrained planning: A monte carlo random walk approach," in 22nd International Conference on Automated Planning and Scheduling (ICAPS), 2012, .
[5]. I. Arce and G. McGraw, "Guest editors' introduction: Why attacking systems is a good idea," IEEE Security & Privacy, vol. 2, pp. 17-19, 2004.
[6]. A. E. Gerevini, A. Saetti and I. Serina, "An approach to efficient planning with numerical fluents and multi-criteria plan quality," Artif. Intell., vol. 172, pp. 899-944, 2008.
[7]. P. Halsum and H. Geffner, "Heuristic planning with time and resource," in IJCAI Workshop on Planning with Resources, Seattle, USA, 2001, .
[8]. M. Steinmetz, "Critical constrained planning and an application to network penetration testing," in The 26th International Conference on Automated Planning and Scheduling, 2016, pp. 141.
[9]. J. Hoffmann and M. Fickert, Explicit Conjunctions W/O Compilation: Computing hFF (Πc) in Polynomial Time (Technical Report), 2015.
[10]. P. P. Shimpi and M. S. Nagpure, "Decentralized Virtual VAPT Laboratory Model," Global Journal for Research Analysis, vol. 4, 2016.
[11]. L. Vishnoi and V. Shrivastava, "Results of Penetration Testing on Various Operating Systems," .
[12]. (2001). Penetration Tests: The Baseline For Effective Information Protection Available: http://www.iss.net/documents/whitepapers/pentestwp.pdf. DOI: 14-12-2016.
[13]. (2014). Penetration Testing. Available: https://www.depts.ttu.edu/cs/research/csecs/workshop/docs/.../Petetration-Testing.ppt. DOI: 14-12-2016.
|