CFP last date
22 April 2024
Reseach Article

Results of Penetration Testing on different Windows Client Operating Systems

by Sushil N. Gawhale, Ramesh R. Manza, Yogesh M. Rajput
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 156 - Number 6
Year of Publication: 2016
Authors: Sushil N. Gawhale, Ramesh R. Manza, Yogesh M. Rajput
10.5120/ijca2016912531

Sushil N. Gawhale, Ramesh R. Manza, Yogesh M. Rajput . Results of Penetration Testing on different Windows Client Operating Systems. International Journal of Computer Applications. 156, 6 ( Dec 2016), 43-45. DOI=10.5120/ijca2016912531

@article{ 10.5120/ijca2016912531,
author = { Sushil N. Gawhale, Ramesh R. Manza, Yogesh M. Rajput },
title = { Results of Penetration Testing on different Windows Client Operating Systems },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2016 },
volume = { 156 },
number = { 6 },
month = { Dec },
year = { 2016 },
issn = { 0975-8887 },
pages = { 43-45 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume156/number6/26716-2016912531/ },
doi = { 10.5120/ijca2016912531 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:01:54.071996+05:30
%A Sushil N. Gawhale
%A Ramesh R. Manza
%A Yogesh M. Rajput
%T Results of Penetration Testing on different Windows Client Operating Systems
%J International Journal of Computer Applications
%@ 0975-8887
%V 156
%N 6
%P 43-45
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Windows operating systems are very popular among people from common men to specialists also. We will be working on some operating systems in this paper. People out of there often select windows operating system as importance among several others. So are our information and data secured? To answer this we make use of penetration testing on window client operating system and test various exploits on windows operating system by using the kali Linux Operating system. Try to exploit operating system. Penetration tests provide evidence that vulnerabilities do exist as a result network penetrations are possible as well as any workstation vulnerability. They provide a blueprint for remediation. Methodology include: discovery, enumeration, vulnerability identification, vulnerability assessment, exploitation and launching of attack, reporting, external penetration testing, internal penetration testing, legal issues before you start.

References
  1. Vulnerability Assessment and Penetration Testing http://www.aretecon.com/aretesoftwares/ vapt.html
  2. Internet Crime Complaint Centre link: www.ic3.gov
  3. Liu, Bingchang; Shi, Liang; Cai, Zhuhua; Li, Min; “Software vulnerability Discovery Techniques: A Survey” IEEE Conference Publication, DOI: 10.1109/MINES.2012.202, Page(s) 152-156, 2012
  4. Smith, Yurick, Doss “Ethical Hacking” IEEE Conference Publication, DOI:10.1147/sj.403.0769, Page (s): 769-780
  5. Bradley, Rubin “Computer Security Education and Research: Handle with care” IEEE Conference Publication, DOI: 10.1109/MSP.2006.146, Page(s): 56-59
  6. Prakash Chandra Behera, Chinmaya Dash “Ethical Hacking: A Security Assessment Tool to Uncover Loopholes and Vulnerabilities in Network and to Ensure Protection to the System”, International Journal of Innovations & Advancement in Computer Science IJIACS ISSN 2347 – 8616 Volume 4, Special Issue May 2015.
  7. Robinson, S. “Art of Penetration Testing” Security of Distributed Control Systems, 2005. The IEE Seminar on Date of Conference: 2 Nov. 2005. Page(s): 71 – 76.
  8. Budiarto, R.,Sureswaran Ramadass “Development of penetration testing model for increasing security” Information and Communication Technologies: From Theory to Applications, 2004. 2004 International Conference on Date of Conference: 19-23 April 2004, Page(s): 563 - 564.
  9. Network Penetration Testing Expert “US-COUNCIL”, link https://www.us-council.com/free-ebooks/NPTE-Student-Handbook/html5forpc.html.
Index Terms

Computer Science
Information Sciences

Keywords

Exploit payload Hacker Structure hacking unstructured hacking Penetration Testing Information Security.