Cyber security is gaining tremendous importance due to the increased reliance on the internet, computer systems and wireless networks like Wi-Fi and Bluetooth. Explosive growth of internet has invited in new advancements, but these technical advancements have a dark side: Attackers. To sway away the cyber attacks caused by the attackers, it is a vital job to provide a tough security to the arrangement. This research explores the characteristics of our security tool “Autoploit”. Autoploit is used for scanning and exploiting. It is applied in checking the security of nodes in LAN and Web application. The process starts with scanning. For scanning of nodes in LAN, IP address is taken as the input and for website, URL of the website is taken as the input. After scanning process is carried out, all the vulnerable open ports are discovered. Banner grabbing gives the services of the vulnerable ports. Later in exploiting, Autoploit has its own exploits. Exploiting is done by version wise attack. It prevents the system from crashing. If the exploiting is successful then it is concluded that the system is not secure enough. Thus Autoploit is used to give the security efficiency report of the tested system.
CITATION STYLE
Jadhav, R., Ovhal, S., Mutyal, P., Damale, A., & Nagannawar, S. (2019). Automating security vulnerabilities using scanning and exploiting. International Journal of Innovative Technology and Exploring Engineering, 8(8 Special Issue 3), 67–70.
Mendeley helps you to discover research relevant for your work.