Penetration Testing on Virtual Machines
Author
Abstract

Pen-testing or penetration testing is an exercise embraced to differentiate and take advantage of all the possible weaknesses in a system or network. It certifies the reasonability or deficiency of the security endeavours which have been executed. Our manuscript shows an outline of pen testing. We examine all systems, the advantages, and respective procedure of pen testing. The technique of pen testing incorporates following stages: Planning of the tests, endlessly tests investigation. The testing stage includes the following steps: Weakness investigation, data gathering and weakness exploitation. This manuscript furthermore shows the application of this procedure to direct pen testing on the model of the web applications.

Year of Publication
2022
Date Published
oct
Publisher
IEEE
Conference Location
Noida, India
ISBN Number
978-1-66547-433-7
URL
https://ieeexplore.ieee.org/document/9964926/
DOI
10.1109/ICRITO56286.2022.9964926
Google Scholar | BibTeX | DOI