Analysis of Network Vulnerability through Pen Testing
Foram Suthar1, Samarat V.O. Khanna2

1Foram Suthar, Student, Department of Computer Engineering, Indus University, Gujarat, India.

2Samarat V.O. Khanna, Former Director of IICT, Indus University, Gujarat, India,

Manuscript received on 10 April 2021 | Revised Manuscript received on 20 April 2021 | Manuscript Accepted on 15 May 2021 | Manuscript published on 30 May 2021 | PP: 9-11 | Volume-1 Issue-1, May 2021 | Retrieval Number: 100.1/ijcns.A1404111121

Open Access | Ethics and Policies | Indexing and Abstracting
© The Authors. Published by Lattice Science Publication (LSP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Now a day internet becomes a mandate for the people. The usage of the internet is increasing rapidly. Every year new devices are connected to the internet and store their data with positively increase of the usage in the technology and internet also having the dark side of security breaches and cyber-attacks which negatively affect the organization. Security of the system and network is now a topmost priority for the people. Many methodologies and techniques have been used to identify the flaws and vulnerabilities in the system to prevent cyber-attacks. Pen testing is one of the proper processes of getting the loophole of the network. In this paper, we have analyzed network-related vulnerabilities using a black box and white box testing. We have used different pen testing tools to find the loopholes and simulate privilege escalation attacks in the network.

Keywords: Vulnerability, Cyber Attack, Pen Testing.