Network Security Implementation using Penetration Testing

Authors

  • Ms. Komal Department of Computer Science, Amity University Haryana,

Keywords:

Penetration Testing, Pen Test, BackTrack Linux, Kali Linux, Password Cracking.

Abstract

There are plethora of tools and techniques utilized by network administrators to ensure better network security including firewalls, Intrusion Detection/ Prevention Systems, Multi-layered Demilitarized zones, proxy servers, traffic analysis tools, logging capabilities etc. Vulnerability assessment still holds a critical role to evaluate the deployed security and suggest mitigation measures for the concerns. Penetration testing is a step further that emulates the attacker actions to completely exploit system services. It generates a snapshot of actual impact on network when the multiple vulnerabilities are exploited. Pen testing has provided a new dimension to network security and its deployment. BackTrack Linux as well as Kali Linux has numerous tools to assist in the process of penetration testing. This paper provides an overview of essentials of penetration testing and password cracking along with experimental results.

Downloads

Published

2018-05-28

How to Cite

Ms. Komal. (2018). Network Security Implementation using Penetration Testing. International Journal of Technical Innovation in Modern Engineering & Science, 4(5), 1309–1313. Retrieved from https://www.ijtimes.com/index.php/ijtimes/article/view/1688