Automating security vulnerabilities using scanning and exploiting

ISSN: 22783075
0Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.

Abstract

Cyber security is gaining tremendous importance due to the increased reliance on the internet, computer systems and wireless networks like Wi-Fi and Bluetooth. Explosive growth of internet has invited in new advancements, but these technical advancements have a dark side: Attackers. To sway away the cyber attacks caused by the attackers, it is a vital job to provide a tough security to the arrangement. This research explores the characteristics of our security tool “Autoploit”. Autoploit is used for scanning and exploiting. It is applied in checking the security of nodes in LAN and Web application. The process starts with scanning. For scanning of nodes in LAN, IP address is taken as the input and for website, URL of the website is taken as the input. After scanning process is carried out, all the vulnerable open ports are discovered. Banner grabbing gives the services of the vulnerable ports. Later in exploiting, Autoploit has its own exploits. Exploiting is done by version wise attack. It prevents the system from crashing. If the exploiting is successful then it is concluded that the system is not secure enough. Thus Autoploit is used to give the security efficiency report of the tested system.

Cite

CITATION STYLE

APA

Jadhav, R., Ovhal, S., Mutyal, P., Damale, A., & Nagannawar, S. (2019). Automating security vulnerabilities using scanning and exploiting. International Journal of Innovative Technology and Exploring Engineering, 8(8 Special Issue 3), 67–70.

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free