Search
Skip to Search Results- 6penetration testing
- 4Metasploit
- 2Kali Linux
- 2vulnerabilities
- 1Metasploit framework
- 1Metasploitable 2
- 1Ahuja, Puneet
- 1Ancha, Jyothi Sharmila
- 1Bagla, Navjot
- 1Bhusri, Sagar
- 1Bonagiri, Raja Venkata Sandeep Kumar
- 1Chauhan, Bhavyarajsinh
-
2018
This paper presents an insight into attacks on Supervisory Control and Data Acquisition (SCADA) systems specifically focusing on systems that use the Modbus TCP protocol. A penetration testing approach is adopted using a novel penetration testing tool to (i) test the effectiveness and efficiency...
-
2021-06-01
Kolencheril, Jerbin Joy, Messerschmidt, Mitchell, Bhusri, Sagar, Kotha, Vamshidhar Reddy, Jawanda, Gurcharan, Thomas, Betsy Elsa, Bonagiri, Raja Venkata Sandeep Kumar, Shah, Aakash, Nallarala, Abhilash, Garg, Gaurav, Pathak, Isha, Saggu, Ravdeep, Doddaka, Sravya, Pole, Sparsha, Singh, Satinderpal, Vadlamudi, Tejaswini, Sethuraman, Vigneshwar, Vangala, Vishista, Kaur, Amritpal, Kaur, Parminder, Chittimalla, Sai Kumar, Chittimalla, Sandeep, Patel, Priyesha, Kirandeep, Singh, Mandeep, Joshi, Dhanvi, Pathan, Rahim Khan, Ancha, Jyothi Sharmila, Kaur, Amandeep, Bagla, Navjot, Thakur, Preeti, Pugalenthi, Subaveena, Garrapu, Tharun, Gummakonda, Anirudh, Soobhri, Pawan, Kaur, Simranbir, Ahuja, Puneet, Rathod, Divya, Varma, Upasana, Nadipineni, Pavan kumar, Vemuri, Keerthi Kishore, Maadeereddy, Amulya, Raikar, Akshata Rajendra, Sunkara, Leela Suresh, Mehta, Akshat, Heena, Kaur, Kiranjit, Shah, Anish Manishkumar, Elumalai, Sweatha, Joshi, Mansi, Chauhan, Bhavyarajsinh, Nellore, Rishab Kumar Singh, Lindskog, Dale
In recent years, the prevalent utilization of technology and web applications has given rise to security vulnerabilities. This problem has dramatically increased the demand for proposed security models and mechanisms. Organizations find it challenging to secure their web applications and find...
-
Exploiting the vulnerabilities on Metasploit 3 (Ubuntu) machine using Metasploit framework and methodologies
Download2020
A penetration test is also known as a pen test, pentest or ethical hacking. Penetration testing helps to secure networks and highlights the security issues. In this unit, investigate different aspects of penetration testing, including phases, tools, attack methodologies. More specifically, we...
-
2020
This unit focuses on penetration testing, and the main objective is to perform penetration testing on Metasploitable 3 to exploit vulnerabilities and to escalate privileges to administrator rights or higher. The primary purpose of this unit is to exploit Metasploitable 3 by taking reference from...
-
2020
Web Applications are subject to threats as they tend to be vulnerable. This unit will be focusing on various web application vulnerability detection and attempting to exploit them as well. The main goal will be to identify and utilize some of the tools to perform penetration testing on existing...