OPERATING SYSTEM SECURITY AND PENETRATION TESTING

Authors

  • Adoga H. U. Department of Computer Science, Faculty of Science, Federal University Lafia, Nasarawa State, Nigeria Author
  • Ezugwu E. A. Department of Computer Science, Faculty of Science, Federal University Lafia, Nasarawa State, Nigeria Author
  • Umar M. B. Department of Computer Science, Faculty of Science, Federal University Lafia, Nasarawa State, Nigeria Author

Keywords:

Malware, operating system security, work station virtualization, penetration testing, network security

Abstract

Penetration testing is an integral part of any organization or individual that employs the use of Information Technology services. This ensures that their computing infrastructures are checked for vulnerabilities in a routine manner. This paper explains the processes and phases involved in ethical hacking. In addition, major penetration testing types available are also discussed. A Local Area Network (LAN) was designed in a virtual environment running Linux and Windows Operating Systems. We carried out a white box penetration test on the systems. Kali Linux; an open source Debian-based Linux distribution designed for penetration testing and digital forensics was used for the experiment. Several built-in tools in Kali Linux were used, while going through the main phases of penetration testing. Starting from the reconnaissance phase of the process, information about computers was gathered, the network was scanned for vulnerabilities in the scanning phase, and identified vulnerabilities were exploited in the third phase of the penetration test, which is gaining access. Backdoors to exploited system(s) were created to maintain access and event logs were deleted to prevent detection in the final phase of the process

Downloads

Download data is not yet available.
front

Downloads

Published

31-12-2016

How to Cite

OPERATING SYSTEM SECURITY AND PENETRATION TESTING. (2016). FULafia Journal of Science and Technology , 2(2), 151-157. https://lafiascijournals.org.ng/index.php/fjst/article/view/66

Similar Articles

11-20 of 70

You may also start an advanced similarity search for this article.