Journal of Engineering and Applied Sciences
Year:
2017
Volume:
12
Issue:
9 SI
Page No.
8723 - 8729
Penetration Testing: Vulnerability Analysis in a Virtual Environment
Authors :
C.V.Arjun
References
Arjun, C.V. and S. Pooja, 2017. Penetration testing: An art of information gathering in an ethical way. Proceedings of the 1st International Conference on Contemporary Issues in Science, Engineering and Management (ICCI-SEM-2017), February 18-19, 2017, Gandhi Institute for Technology, Bhubaneswar, India, pp: 119-125.
CIRT.net, 2017. Suspicion breeds confidence. CIRT.net, Chantilly, Virginia.
Cybrary, 2015. Summarizing the five phases of penetration testing. Cybrary, Greenbelt, Maryland. https://www.cybrary.it/2015/05/summarizing-the-five-phases-of-penetration-testing/.
GitHub, Inc., 2015. Buckyroberts/Source-code-from-tutorials. GitHub, Inc., San Francisco, California, USA. https://github.com/buckyroberts/Source-Code-from-Tutorials/blob/master/Nmap/cheatSheet.sh.
Reddy, M.R. and P. Yalla, 2016. Mathematical analysis of penetration testing and vulnerability countermeasures. Proceedings of the 2016 IEEE International Conference on Engineering and Technology (ICETECH), March 17-18, 2016, IEEE, Coimbatore, India, ISBN:978-1-4673-9915-9, pp: 26-30.
Silberschatz, A., G.B. Peter and G. Gagne, 2008. Operating System Concepts. 8th Edn., John Wiley & Sons, Hoboken, New Jersey, USA., ISBN-13:978-0470128725, Pages: 992.
Vega, 2014. Vega package description. Vega, Canada. https://tools.kali.org/web-applications/vega.