OPERATING SYSTEM SECURITY AND PENETRATION TESTING
Keywords:
Array, Array, Array, Array, ArrayAbstract
Penetration testing is an integral part of any organization or individual that employs the use of Information Technology services. This ensures that their computing infrastructures are checked for vulnerabilities in a routine manner. This paper explains the processes and phases involved in ethical hacking. In addition, major penetration testing types available are also discussed. A Local Area Network (LAN) was designed in a virtual environment running Linux and Windows Operating Systems. We carried out a white box penetration test on the systems. Kali Linux; an open source Debian-based Linux distribution designed for penetration testing and digital forensics was used for the experiment. Several built-in tools in Kali Linux were used, while going through the main phases of penetration testing. Starting from the reconnaissance phase of the process, information about computers was gathered, the network was scanned for vulnerabilities in the scanning phase, and identified vulnerabilities were exploited in the third phase of the penetration test, which is gaining access. Backdoors to exploited system(s) were created to maintain access and event logs were deleted to prevent detection in the final phase of the process
Published
How to Cite
Issue
Section
How to Cite
Most read articles by the same author(s)
- Ofem P. O., Adebo T. I., Agushaka J. O., Umar M. B., EMPIRICAL VALIDATION OF ONLINE FEATURES IN USER ACCEPTANCE OF WEB SHOPPING CENTERS IN NIGERIA: A PRELIMINARY STUDY , FULafia Journal of Science and Technology : Vol. 2 No. 1 (2016): Fulafia Journal of Science and Technology (FJST)
- Adoga H. U., Imam H. A., Dauda A., Og-bonoko J. F., Bako U. M., Ochang P. A., Agushaka J. O., Improved Security Techniques in Multi-Protocol Label Switching , FULafia Journal of Science and Technology : Vol. 5 No. 2 (2019): Fulafia Journal of Science and Technology (FJST)
Similar Articles
- Adebisi O. I., Adejumobi A. I., Okoye F. E., Jokojeje R. A., LEAST SQUARE REGRESSION METHOD FOR LOAD MANAGEMENT IN ELECTRICITY DISTRIBUTION NETWORK OF A 33 KV FEEDER AT FEDERAL UNIVERSITY OF AGRICULTURE ABEOKUTA, NIGERIA , FULafia Journal of Science and Technology : Vol. 4 No. 2 (2018): Fulafia Journal of Science and Technology (FJST)
- Nnamdi O., Adebimpe E., Omodunbi B., Nwobodo L., Nduanya U., Oyediji F., DEVELOPMENT OF A DOOR LOCK SECURITY SYSTEM BASED ON AUTOMATIC SPEECH RECOGNITION , FULafia Journal of Science and Technology : Vol. 4 No. 2 (2018): Fulafia Journal of Science and Technology (FJST)
- Alao P. O., Okandeji A. A., Onaifo F., Sobukonla P. A., Adekoya O. A., Adekoya O. A., Adekoya O. A., FAULTS ANALYSIS OF 33KV ELECTRICITY DISTRIBUTION SYSTEM IN THE ABEOKUTA BUSINESS HUB , FULafia Journal of Science and Technology : Vol. 7 No. 1 (2021): Fulafia Journal of Science and Technology (FJST)
- Oyeleye M. O., Melodi A. O., LIGHTNING PROTECTIVE SYSTEM: SIZING OF INTERCEPTION, DOWN CONDUCTOR AND EARTHING NETWORKS ON NIGERIAN 11-132 KV SUBSTATIONS , FULafia Journal of Science and Technology : Vol. 7 No. 1 (2021): Fulafia Journal of Science and Technology (FJST)
- Adebisi O. I., Adejumobi A. I., Olanipekun A. J., Bello O. H., DEVELOPMENT OF A FUEL LEVEL MEASURING SYSTEM FOR UNDERGROUND LIQUID TANKS , FULafia Journal of Science and Technology : Vol. 4 No. 2 (2018): Fulafia Journal of Science and Technology (FJST)
- Ignatius Okakwu, RELIABILITY ANALYSIS OF A HYBRID PV/WIND/BATTERY SYSTEM USING EVENT TREE APPROACH , FULafia Journal of Science and Technology : Vol. 9 No. 1 (2025): Vol. 9 No. 1 (March, 2025): Fulafia Journal of Science and Technology (FJST)
- Olajide M. B., Okandeji A. A., Olasunkanmi O. G., Salawu A. M., Jagun Z. O., Ogunjobi S. G., DESIGN AND IMPLEMENTATION OF A BALANCED THREE-PHASE POWER PROTECTION SYSTEM , FULafia Journal of Science and Technology : Vol. 5 No. 2 (2019): Fulafia Journal of Science and Technology (FJST)
- Amusa K. A., Adewusi A., Olanipekun A. J., DEVELOPMENT OF INFRARED-BASED LOW COST BIDIRECTIONAL COUNTER , FULafia Journal of Science and Technology : Vol. 4 No. 2 (2018): Fulafia Journal of Science and Technology (FJST)
- A. M. Oyelakin, Salau-Ibrahim T. T., Ogidan B. S., Azeez R. D., Ajiboye I. K., PEER-TO-PEER BOTNETS: A SURVEY ON PROPAGATION, DETECTION AND DETECTION EVASION TECHNIQUES , FULafia Journal of Science and Technology : Vol. 5 No. 2 (2019): Fulafia Journal of Science and Technology (FJST)
- Moshood A. Hambali, Beatrice A. Ayati, Yinusa A. Olasupo, Mu’awuya Dalhatu, Adesina A. Akinyemi, AN INTELLIGENT FEATURE-OPTIMIZED FRAMEWORK FOR DDoSATTACK DETECTION USING SVM and XGBOOST , FULafia Journal of Science and Technology : Vol. 10 No. 1 (2026): Fulafia Journal of Science and Technology (FJST)
You may also start an advanced similarity search for this article.