Penetration testing: Concepts, attack methods, and defense strategies | IEEE Conference Publication | IEEE Xplore

Penetration testing: Concepts, attack methods, and defense strategies


Abstract:

Penetration testing helps to secure networks, and highlights the security issues. In this paper investigate different aspects of penetration testing including tools, atta...Show More

Abstract:

Penetration testing helps to secure networks, and highlights the security issues. In this paper investigate different aspects of penetration testing including tools, attack methodologies, and defense strategies. More specifically, we performed different penetration tests using a private networks, devices, and virtualized systems and tools. We predominately used tools within the Kali Linux suite. The attacks we performed included: smartphone penetration testing, hacking phones Bluetooth, traffic sniffing, hacking WPA Protected Wifi, Man-in-the-Middle attack, spying (accessing a PC microphone), hacking phones Bluetooth, and hacking remote PC via IP and open ports using advanced port scanner. The results are then summarized and discussed. The paper also outlined the detailed steps and methods while conducting these attacks.
Date of Conference: 29-29 April 2016
Date Added to IEEE Xplore: 20 June 2016
Electronic ISBN:978-1-4673-8490-2
Conference Location: Farmingdale, NY, USA

Contact IEEE to Subscribe

References

References is not available for this document.