High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

VAPT of Network, Network Connected Devices using Raspberry PI and VNC Viewer

Author(s):

Ashutosh Kumar Bharti , Maharaja Agrasen Institute of Technology; Harsh Bijarnia, Maharaja Agrasen Institute of Technology; Bhoomi Gupta, Maharaja Agrasen Institute of Technology

Keywords:

VAPT, Raspberry Pi, VNC, Network, Mobile Devices, Security, Flaws, Vulnerabilities, Kali Linux

Abstract

This paper reviews the general exploitation of unattended networks or network loosely configured. VAPT is employed to such networks to detect and exploit these networks. Vulnerability assessment tools discover which vulnerabilities are present, but they do not differentiate between flaws that can be exploited. Penetration tests attempt to exploit the vulnerabilities in a system to determine whether unauthorized access or other malicious activity is possible and identify which flaws pose a threat to the application. . A penetration test is meant to show how damaging a flaw could be in a real attack rather than find every flaw in a system. Together, penetration testing and vulnerability assessment tools provide a detailed picture of the flaws that exist in an application and the risks associated with those flaws.

Other Details

Paper ID: IJSRDV6I21552
Published in: Volume : 6, Issue : 2
Publication Date: 01/05/2018
Page(s): 3549-3551

Article Preview

Download Article