Journal of Engineering and Applied Sciences

Year: 2017
Volume: 12
Issue: 9 SI
Page No. 8723 - 8729

Penetration Testing: Vulnerability Analysis in a Virtual Environment

Authors : C.V.Arjun

References

Arjun, C.V. and S. Pooja, 2017. Penetration testing: An art of information gathering in an ethical way. Proceedings of the 1st International Conference on Contemporary Issues in Science, Engineering and Management (ICCI-SEM-2017), February 18-19, 2017, Gandhi Institute for Technology, Bhubaneswar, India, pp: 119-125.

CIRT.net, 2017. Suspicion breeds confidence. CIRT.net, Chantilly, Virginia.

Cybrary, 2015. Summarizing the five phases of penetration testing. Cybrary, Greenbelt, Maryland. https://www.cybrary.it/2015/05/summarizing-the-five-phases-of-penetration-testing/.

GitHub, Inc., 2015. Buckyroberts/Source-code-from-tutorials. GitHub, Inc., San Francisco, California, USA. https://github.com/buckyroberts/Source-Code-from-Tutorials/blob/master/Nmap/cheatSheet.sh.

Reddy, M.R. and P. Yalla, 2016. Mathematical analysis of penetration testing and vulnerability countermeasures. Proceedings of the 2016 IEEE International Conference on Engineering and Technology (ICETECH), March 17-18, 2016, IEEE, Coimbatore, India, ISBN:978-1-4673-9915-9, pp: 26-30.

Silberschatz, A., G.B. Peter and G. Gagne, 2008. Operating System Concepts. 8th Edn., John Wiley & Sons, Hoboken, New Jersey, USA., ISBN-13:978-0470128725, Pages: 992.

Vega, 2014. Vega package description. Vega, Canada. https://tools.kali.org/web-applications/vega.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved