Please use this identifier to cite or link to this item: http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/6821
Full metadata record
DC FieldValueLanguage
dc.contributor.authorRatti, Nakul-
dc.contributor.authorSingh, Yashwant [Guided by]-
dc.date.accessioned2022-09-26T10:04:09Z-
dc.date.available2022-09-26T10:04:09Z-
dc.date.issued2017-
dc.identifier.urihttp://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/6821-
dc.description.abstractPenetration Testing is a specialized security auditing method where a tester simulates an attack on the system. The goal of this testing is not to damage the system, but to identify attack surfaces, vulnerabilities, and other security weaknesses from the perspective of an attacker. Besides testing, great care is taken that no system should get damaged .This type of testing involves manual scanning tools like nmap, nikto, wpscan, metasploit and automated vulnerability scanning tools like Nessus. This report first introduces to the steps taken for testing the security of a system and then it shows the attack narrative where the system would be exploited and proof of exploitation would be showed .Lastly, the vulnerabilities would be rated according to their impact on the system and recommendations on each vulnerability would be given.en_US
dc.language.isoenen_US
dc.publisherJaypee University of Information Technology, Solan, H.P.en_US
dc.subjectNmap commanden_US
dc.subjectExploiting Distccen_US
dc.subjectHping3en_US
dc.titlePenetration Testing on Metasploitableen_US
dc.typeProject Reporten_US
Appears in Collections:B.Tech. Project Reports

Files in This Item:
File Description SizeFormat 
Penetration Testing on Metasploitable2.pdf1.99 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.