VAPT of Network, Network Connected Devices using Raspberry PI and VNC Viewer |
Author(s): |
| Ashutosh Kumar Bharti , Maharaja Agrasen Institute of Technology; Harsh Bijarnia, Maharaja Agrasen Institute of Technology; Bhoomi Gupta, Maharaja Agrasen Institute of Technology |
Keywords: |
| VAPT, Raspberry Pi, VNC, Network, Mobile Devices, Security, Flaws, Vulnerabilities, Kali Linux |
Abstract |
|
This paper reviews the general exploitation of unattended networks or network loosely configured. VAPT is employed to such networks to detect and exploit these networks. Vulnerability assessment tools discover which vulnerabilities are present, but they do not differentiate between flaws that can be exploited. Penetration tests attempt to exploit the vulnerabilities in a system to determine whether unauthorized access or other malicious activity is possible and identify which flaws pose a threat to the application. . A penetration test is meant to show how damaging a flaw could be in a real attack rather than find every flaw in a system. Together, penetration testing and vulnerability assessment tools provide a detailed picture of the flaws that exist in an application and the risks associated with those flaws. |
Other Details |
|
Paper ID: IJSRDV6I21552 Published in: Volume : 6, Issue : 2 Publication Date: 01/05/2018 Page(s): 3549-3551 |
Article Preview |
|
|
|
|
