Visible to the public Exploit Security Vulnerabilities by Penetration Testing

TitleExploit Security Vulnerabilities by Penetration Testing
Publication TypeConference Paper
Year of Publication2022
AuthorsSweigert, Devin, Chowdhury, Md Minhaz, Rifat, Nafiz
Conference Name2022 IEEE International Conference on Electro Information Technology (eIT)
Date Publishedmay
KeywordsBlack Box Test, Companies, composability, Computer hacking, computer networks, Conferences, dark web, DDoS, DoS, Hashcat, information technology, Kali Linux, Metrics, Penetration Testing, pubcrawl, Resiliency, security, White Box Security, White Box Test
AbstractWhen we setup a computer network, we need to know if an attacker can get into the system. We need to do a series of test that shows the vulnerabilities of the network setup. These series of tests are commonly known Penetration Test. The need for penetration testing was not well known before. This paper highlights how penetration started and how it became as popular as it has today. The internet played a big part into the push to getting the idea of penetration testing started. The styles of penetration testing can vary from physical to network or virtual based testing which either can be a benefit to how a company becomes more secure. This paper presents the steps of penetration testing that a company or organization needs to carry out, to find out their own security flaws.
DOI10.1109/eIT53891.2022.9813929
Citation Keysweigert_exploit_2022