{"title":"网络渗透测试研究综述","authors":"G. Jayasuryapal, P. Pranay, H. Kaur, Swati","doi":"10.1109/ICIEM51511.2021.9445321","DOIUrl":null,"url":null,"abstract":"Penetration on network is an important security measurements every company want to take into the consideration. Day-to-Day life as it is seen that cybercrimes are increasing due to lack of security practice. Penetration testing is an outstanding approach where pen tester evaluates the security of network and numerous applications by simulating attacks from attacker’s view point .Additionally, penetration testing process follow certain rules and agreement that both the parties ( client and pen testing team). By this testing, the company’s weakness will be detected like open servers and open ports etc. so we can take a countermeasure by doing penetration testing on the company. This paper contains some of the important terms and steps to do a strong penetration testing on organizations. Hence, this paper covered all the mechanisms including information gathering to the post exploitation.","PeriodicalId":264094,"journal":{"name":"2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"A Survey on Network Penetration Testing\",\"authors\":\"G. Jayasuryapal, P. Pranay, H. Kaur, Swati\",\"doi\":\"10.1109/ICIEM51511.2021.9445321\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Penetration on network is an important security measurements every company want to take into the consideration. Day-to-Day life as it is seen that cybercrimes are increasing due to lack of security practice. Penetration testing is an outstanding approach where pen tester evaluates the security of network and numerous applications by simulating attacks from attacker’s view point .Additionally, penetration testing process follow certain rules and agreement that both the parties ( client and pen testing team). By this testing, the company’s weakness will be detected like open servers and open ports etc. so we can take a countermeasure by doing penetration testing on the company. This paper contains some of the important terms and steps to do a strong penetration testing on organizations. Hence, this paper covered all the mechanisms including information gathering to the post exploitation.\",\"PeriodicalId\":264094,\"journal\":{\"name\":\"2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)\",\"volume\":\"54 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-04-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICIEM51511.2021.9445321\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIEM51511.2021.9445321","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Penetration on network is an important security measurements every company want to take into the consideration. Day-to-Day life as it is seen that cybercrimes are increasing due to lack of security practice. Penetration testing is an outstanding approach where pen tester evaluates the security of network and numerous applications by simulating attacks from attacker’s view point .Additionally, penetration testing process follow certain rules and agreement that both the parties ( client and pen testing team). By this testing, the company’s weakness will be detected like open servers and open ports etc. so we can take a countermeasure by doing penetration testing on the company. This paper contains some of the important terms and steps to do a strong penetration testing on organizations. Hence, this paper covered all the mechanisms including information gathering to the post exploitation.