Analysis Of Vulnerability Assessment With Penetration Testing

  • Mrs. Aswathy Mohan, Dr. G. Aravind Swaminathan

Abstract

 Cyber security is undergoing tremendous growth in industrial and educational environment.  Now a day’s cyber security experts are challenging the cyber criminals with latest cyber technologies. The cyber criminals are utilizing the vulnerabilities in the organizations to steal confidential information to exploit for financial empowerment. Vulnerability Assessment and Penetration testing is a most modern technique used to overcome the attacks from cyber criminals to avoid the data loss. Among the vulnerabilities high risk and low risk techniques are used. In this survey paper various techniques and tools used in VAPT technology will be analyzed. Using this survey, the whole techniques are explained in an effective approach. Vulnerability Assessment is the approach through which the security loopholes through which hackers can enter in the target system are identified. Penetration Testing is the simulation of attack as a hacker with the legal consent from the owner of the target system. They provide the security report and guidelines through which the owner can rectify the security holes through which the attackers can access the target system. The most effective tool used in penetration Testing is kali Linux OS which provides free and open access tools to perform the test successfully. This paper focuses on the various tools and techniques available in penetration testing to eliminate the threats from hackers or cyber criminals.

Published
2022-02-24
Section
Articles