Penetration Testing on Virtual Machines | |
---|---|
Author | |
Abstract |
Pen-testing or penetration testing is an exercise embraced to differentiate and take advantage of all the possible weaknesses in a system or network. It certifies the reasonability or deficiency of the security endeavours which have been executed. Our manuscript shows an outline of pen testing. We examine all systems, the advantages, and respective procedure of pen testing. The technique of pen testing incorporates following stages: Planning of the tests, endlessly tests investigation. The testing stage includes the following steps: Weakness investigation, data gathering and weakness exploitation. This manuscript furthermore shows the application of this procedure to direct pen testing on the model of the web applications. |
Year of Publication |
2022
|
Date Published |
oct
|
Publisher |
IEEE
|
Conference Location |
Noida, India
|
ISBN Number |
978-1-66547-433-7
|
URL |
https://ieeexplore.ieee.org/document/9964926/
|
DOI |
10.1109/ICRITO56286.2022.9964926
|
Google Scholar | BibTeX | DOI |