IJSTR

International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
0.2
2019CiteScore
 
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020

CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT

IJSTR >> Volume 6 - Issue 12, December 2017 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Importance Of Penetration Testing For Legacy Operating System

[Full Text]

 

AUTHOR(S)

Poorvi Bhatt

 

KEYWORDS

Penetration Testing, Ethical Hacking, Cyber Security, White Hat, NMAP, NETCAT, Metaspoilt,

 

ABSTRACT

Penetration testing is very important technique to find vulnerabilities in commercial networks. There are various techniques for ethical hacking via penetration testing. This report explains a white hat hacker approach of penetration testing. I have performed this test on private network where three PCs are connected through LAN via switch and without firewall. This network is not connected with Internet. All the PCs have windows operating system. The attacker host has windows server 2003 with Service Pack1, second host has windows XP with Service Pack 2 and third host has windows 2000 with service pack 4.

 

REFERENCES

[1] http://wi-fiplanet.webopedia.com/TERM/A/active_reconnaissance.html

[2] Lecture notes and Practical Guidance by Mr. Suranjith
[3] http://www.insecure.org/nmap/

[4] http://searchsecurity.techtarget.com/general/0,295582,sid14_gci1088904,00.html

[5] http://www.metasploit.com/projects/Framework/

[6] http://www.microsoft.com/technet/security/Bulletin/MS03-026.mspx

[7] http://www.kb.cert.org/vuls/id/547820

[8] http://www.kb.cert.org/vuls/id/568148

[9] http://www.microsoft.com/technet/security/bulletin/MS03-039.mspx See Technical Details.