Please use this identifier to cite or link to this item:
http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/6821
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ratti, Nakul | - |
dc.contributor.author | Singh, Yashwant [Guided by] | - |
dc.date.accessioned | 2022-09-26T10:04:09Z | - |
dc.date.available | 2022-09-26T10:04:09Z | - |
dc.date.issued | 2017 | - |
dc.identifier.uri | http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/6821 | - |
dc.description.abstract | Penetration Testing is a specialized security auditing method where a tester simulates an attack on the system. The goal of this testing is not to damage the system, but to identify attack surfaces, vulnerabilities, and other security weaknesses from the perspective of an attacker. Besides testing, great care is taken that no system should get damaged .This type of testing involves manual scanning tools like nmap, nikto, wpscan, metasploit and automated vulnerability scanning tools like Nessus. This report first introduces to the steps taken for testing the security of a system and then it shows the attack narrative where the system would be exploited and proof of exploitation would be showed .Lastly, the vulnerabilities would be rated according to their impact on the system and recommendations on each vulnerability would be given. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Jaypee University of Information Technology, Solan, H.P. | en_US |
dc.subject | Nmap command | en_US |
dc.subject | Exploiting Distcc | en_US |
dc.subject | Hping3 | en_US |
dc.title | Penetration Testing on Metasploitable | en_US |
dc.type | Project Report | en_US |
Appears in Collections: | B.Tech. Project Reports |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Penetration Testing on Metasploitable2.pdf | 1.99 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.