Vulnerability Assessment and Penetration Testing

  ijett-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2013 by IJETT Journal
Volume-4 Issue-3                       
Year of Publication : 2013
Authors :  Ankita Gupta , Kavita , Kirandeep Kaur

MLA 

Ankita Gupta , Kavita , Kirandeep Kaur. "Vulnerability Assessment and Penetration Testing". International Journal of Engineering Trends and Technology (IJETT). V4(3):328-333 Mar 2013. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group.

Abstract

Vulnerability assessment and Penetration Testing (VAPT) is the most comprehensive service for auditing, penetration testing, reporting and patching for your company’s web based applications. With port 80 always open for web access there is always a possibility that a hacker can beat your security systems and have unauthorized access to your systems. Vulnerability assessment and penetration testing are two different and complimentary proactive approaches to assess the security posture of an information system’s network. The Vulnerability Assessment is done to test the security posture of the information system both in ternally and externally . Penetration tests provide evidence that vulnerabilities do exist as a result network penetrations are possible. They provide a blueprint for remediation . Methodology include: discovery , enumeration, vulnerability identification, vulnerability assessment, exploitation and launching of attack, reporting , external penetration testing, internal penetration testing , legal issues before you start.

References

[1 ] Vulnerability Assessment and Penetration Testing http://www.aretecon.com/aretesoftwares/ vapt.html
[2 ] http://searchsoftwarequa lity.techtarget.com/definition/penetration - testing
[3 ] http://www.netragard.com/penetration - testing - definition
[4 ] Introduction to t h e Premier Pen Testing Information Security Certification (Advanced Ethical Hacking)
[5] Laura Chappell’s session TUT233, “Cyber Crime at Packet L evel”, at Novell BrainShare 2001.
[6] C. Anley ,“ Advanced SQL injection in SQL server applications, ” , 2002.
[7 ] Open Web Application Security Project, https://www.owasp.org/index.php/Category: Vulnerability
[8 ] Vulnerability Analysis, http://www. pentest - standard.org/index.php/ Vulnerability_Analysis
[9 ] Penetration Testing Limits http://www. praetorian.com/blog/penetration - testing/ limitations - of - penetration - testing/, 2008
[10] Audit your website security with Acunetix Web Vulnerability Scanner, http://www.acunetix.com/ vulnerability - scanner/

Keywords
Vulnerability Assessment, Penetration Testing, Acunetix