Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

Results of Penetration Testing on different Windows Client Operating Systems

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Authors:
Sushil N. Gawhale, Ramesh R. Manza, Yogesh M. Rajput
10.5120/ijca2016912531

Sushil N Gawhale, Ramesh R Manza and Yogesh M Rajput. Results of Penetration Testing on different Windows Client Operating Systems. International Journal of Computer Applications 156(6):43-45, December 2016. BibTeX

@article{10.5120/ijca2016912531,
	author = {Sushil N. Gawhale and Ramesh R. Manza and Yogesh M. Rajput},
	title = {Results of Penetration Testing on different Windows Client Operating Systems},
	journal = {International Journal of Computer Applications},
	issue_date = {December 2016},
	volume = {156},
	number = {6},
	month = {Dec},
	year = {2016},
	issn = {0975-8887},
	pages = {43-45},
	numpages = {3},
	url = {http://www.ijcaonline.org/archives/volume156/number6/26716-2016912531},
	doi = {10.5120/ijca2016912531},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

Windows operating systems are very popular among people from common men to specialists also. We will be working on some operating systems in this paper. People out of there often select windows operating system as importance among several others. So are our information and data secured? To answer this we make use of penetration testing on window client operating system and test various exploits on windows operating system by using the kali Linux Operating system. Try to exploit operating system. Penetration tests provide evidence that vulnerabilities do exist as a result network penetrations are possible as well as any workstation vulnerability. They provide a blueprint for remediation. Methodology include: discovery, enumeration, vulnerability identification, vulnerability assessment, exploitation and launching of attack, reporting, external penetration testing, internal penetration testing, legal issues before you start.

References

  1. Vulnerability Assessment and Penetration Testing http://www.aretecon.com/aretesoftwares/ vapt.html
  2. Internet Crime Complaint Centre link: www.ic3.gov
  3. Liu, Bingchang; Shi, Liang; Cai, Zhuhua; Li, Min; “Software vulnerability Discovery Techniques: A Survey” IEEE Conference Publication, DOI: 10.1109/MINES.2012.202, Page(s) 152-156, 2012
  4. Smith, Yurick, Doss “Ethical Hacking” IEEE Conference Publication, DOI:10.1147/sj.403.0769, Page (s): 769-780
  5. Bradley, Rubin “Computer Security Education and Research: Handle with care” IEEE Conference Publication, DOI: 10.1109/MSP.2006.146, Page(s): 56-59
  6. Prakash Chandra Behera, Chinmaya Dash “Ethical Hacking: A Security Assessment Tool to Uncover Loopholes and Vulnerabilities in Network and to Ensure Protection to the System”, International Journal of Innovations & Advancement in Computer Science IJIACS ISSN 2347 – 8616 Volume 4, Special Issue May 2015.
  7. Robinson, S. “Art of Penetration Testing” Security of Distributed Control Systems, 2005. The IEE Seminar on Date of Conference: 2 Nov. 2005. Page(s): 71 – 76.
  8. Budiarto, R.,Sureswaran Ramadass “Development of penetration testing model for increasing security” Information and Communication Technologies: From Theory to Applications, 2004. 2004 International Conference on Date of Conference: 19-23 April 2004, Page(s): 563 - 564.
  9. Network Penetration Testing Expert “US-COUNCIL”, link https://www.us-council.com/free-ebooks/NPTE-Student-Handbook/html5forpc.html.

Keywords

Exploit, payload, Hacker, Structure hacking, unstructured hacking, Penetration Testing, Information Security.