Internal Network Penetration Testing Using Free/Open Source Tools: Network and System Administration Approach

6Citations
Citations of this article
33Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Network security is a growing concern in a modern world, irrespective of the size or volume of the organization. Penetration testing is one of the techniques that are used for network and systems security assessment. It involves legally attempting to break into the network to check available vulnerability and exploits, simulating what a real hacker might do. It can enhance the security of the network as it looks for exploits and vulnerability present in the system, then come up with ways to mitigate the risks. In this paper, a virtual network laboratory is designed and setup to conduct the penetration test by demonstrating attacks and intrusion into the network infrastructure. Kali Linux operating system is used to perform penetration testing. Information gathering, vulnerability analysis, exploitation, reporting also presented as part of penetration testing followed by a penetration testing methodology. Theoretical background on penetration testing has also been discussed. Information gathering tools (Dmitry, Nmap and zenmap), vulnerability scanning tools (Nexpose community, Nessus, GFI Languard and OpenVAS) and exploitation tools (Armitage, Metasploit framework) are used to simulate possible attacks.

Cite

CITATION STYLE

APA

Kumar, R., & Tlhagadikgora, K. (2019). Internal Network Penetration Testing Using Free/Open Source Tools: Network and System Administration Approach. In Communications in Computer and Information Science (Vol. 956, pp. 257–269). Springer Verlag. https://doi.org/10.1007/978-981-13-3143-5_22

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free