This paper is published in Volume-7, Issue-4, 2021
Area
Cyber Security
Author
A. N. Anshuman, Abhinandan C., Suraj Upadhya G., Thanushree C., Kishore S. Verma
Org/Univ
Sai Vidya Institute of Technology, Rajanukunte, Karnataka, India
Pub. Date
08 July, 2021
Paper ID
V7I4-1227
Publisher
Keywords
Vulnerability, Penetration Testing, Analysis, Menu-Based Vulnerability Assessment

Citationsacebook

IEEE
A. N. Anshuman, Abhinandan C., Suraj Upadhya G., Thanushree C., Kishore S. Verma. Menu-based Penetration Testing and Vulnerability Assessment, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
A. N. Anshuman, Abhinandan C., Suraj Upadhya G., Thanushree C., Kishore S. Verma (2021). Menu-based Penetration Testing and Vulnerability Assessment. International Journal of Advance Research, Ideas and Innovations in Technology, 7(4) www.IJARIIT.com.

MLA
A. N. Anshuman, Abhinandan C., Suraj Upadhya G., Thanushree C., Kishore S. Verma. "Menu-based Penetration Testing and Vulnerability Assessment." International Journal of Advance Research, Ideas and Innovations in Technology 7.4 (2021). www.IJARIIT.com.

Abstract

The systems and networks run by an individual or an organization are prone to get exploited by hackers for personal gains or any other motive. The flaws or loopholes in the operating systems or operating procedures and practices may lead to a stage where once they are compromised; there is no going back beyond that point. This is a serious issue that must be rectified and safety measures must be inculcated in the operations. The systems and networks in use must be thoroughly checked for vulnerabilities to ensure protection. This is a required objective in every system and every organization. The project that we are working on is a menu-based vulnerability assessment and penetration testing tool that checks the selected system or network and tries to find the most common and most complex risks associated with the system or network. The tool is called EDITH, which stands for “Executable and Distinguished Interface to Hack”. This tool simplifies the process by allowing the authorized user to choose from the options provided. The simplicity of the tool is what makes it idiosyncratic in the field of penetration testing and risk analysis. The tool is built using advanced python modules that support kernel and terminal levels of access and operation rights. The tool provides a wide range of options to check vulnerabilities and perform penetration testing on the selected system or networks. The options are categorized into network-related tests and system-related tests. The tool is capable of performing penetration tests from a low-security system to a highly secured firewall built system. The tests performed by the tool are completely ethical and do not void any laws unless they are used for illegal purposes. This is a brief description of our project.