Penetration Testing Tools

2019 ◽  
pp. 137-180
Author(s):  
Palak Aar ◽  
Aman Kumar Sharma

Penetration testing is defined as the procedure of imposing as an attacker to find out the vulnerabilities in a system that can be used to gain access to system for malicious use. This paper provides an overview of penetration testing and list out the criteria used to select the best tools for the given purpose. It also provides a brief description of the selected tools and furthermore we compare those tools. The results of the comparison are shown in terms of graphs and tables.


2021 ◽  
Author(s):  
Kenneth AJ G. Quilantang ◽  
James Andrei C. Rivera ◽  
Mark Vincent M. Pinili ◽  
Alphonsus Joseph Nicollo R. Magpantay ◽  
Eric Busia Blancaflor ◽  
...  

2016 ◽  
Vol 74 (12) ◽  
pp. 6454-6469 ◽  
Author(s):  
Fernando Román Muñoz ◽  
Esteban Alejandro Armas Vega ◽  
Luis Javier García Villalba

2017 ◽  
Vol 7 (1.1) ◽  
pp. 411
Author(s):  
K Raja Sekhar ◽  
Pavanasurya M ◽  
Komal Bharti ◽  
Dhanya G

In Computer Security, the term vulnerability refers as a flaw in the system which creates a hole, giving an attacker a chance of taking control over the system. Any Software, Web application or anything related to computer product is vulnerable to attack in different ways like code stealing, sniffing of packets, hijacking the network, making the system compromised etc. In order to avoid such attacks a constant check has to be done and the check has to be done through various Pen testing tools. Penetration tools are one which is used to perform security check on an application to find the presence of exploitable vulnerabilities. In this paper, we look over the penetration tools like CODEPULSE (the code stealer), ETTERCAP (the Sniffer and Hijacker) and made a systematic review of various websites which are vulnerable to SQL Injection and Cross-site Scripting. 


2018 ◽  
Vol 2 (4) ◽  
pp. 11-27
Author(s):  
Faisal Waheed ◽  
Maaruf Ali

This second part covers the implementation, testing, critical evaluation, conclusion and further study. It concentrates on the actual implementation details of hardening of network devices by referring to the hardware and software components, device operating system’s features, management controls, access-list restrictions, operational configurations and critically making sure that the data and credentials are not stored or transferred in ‘plaintext’ over the network by detailed testing and evaluation. It investigates the commands used to enable cryptography and network protocols based on encryption, in order to meet the need for essential security requirements. Substantial work is devoted to the command line details and testing of a router based on Cryptography and Security Protocols in the border router. A step-by-step hardening approach is detailed using the commands used to secure the proposed network framework’s border router. Encrypted services coupled with best practice configurations are explained and tested in an emulated environment. The use of protocol analysers, CISCO Configuration Professional’s Audit and penetration testing tools corroborated the success of the project.


2021 ◽  
pp. 513-518
Author(s):  
Artem Tetskyi ◽  
Vyacheslav Kharchenko ◽  
Dmytro Uzun ◽  
Artem Nechausov

During penetration testing of web applications, different tools are actively used to relieve the tester from repeating monotonous operations. The difficulty of the choice is in the fact that there are tools with similar functionality, and it is hard to define which tool is best to choose for a particular case. In this paper, a solution of the problem with making a choice by creating a Web service that will use a neural network on the server side is proposed. The neural network is trained on data obtained from experts in the field of penetration testing. A trained neural network will be able to select tools in accordance with specified requirements. Examples of the operation of a neural network trained on a small sample of data are shown. The effect of the number of neural network learning epochs on the results of work is shown. An example of input data is given, in which the neural network could not select the tool due to insufficient data for training. The advantages of the method shown are the simplicity of implementation (the number of lines of code is used as a metric) and the possibility of using opinions about tools from various experts. The disadvantages include the search for data for training, the need for experimental selection of the parameters of the neural network and the possibility of situations where the neural network will not be able to select tool that meets the specified requirements.


2018 ◽  
Vol Volume-2 (Issue-4) ◽  
pp. 2595-2597
Author(s):  
Nilesh Bhingardeve ◽  
Seeza Franklin ◽  

Sign in / Sign up

Export Citation Format

Share Document