Open Access   Article Go Back

Information Gathering and FootPrinting Framework for Penetration Testing using Shell Script

Gopichand D1 , Lakshmikar B2 , Siva Teja G3 , Chaitanya Sai G4 , Raghavendra Reddy5

Section:Survey Paper, Product Type: Journal Paper
Volume-07 , Issue-14 , Page no. 239-244, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7si14.239244

Online published on May 15, 2019

Copyright © Gopichand D, Lakshmikar B, Siva Teja G, Chaitanya Sai G, Raghavendra Reddy . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Gopichand D, Lakshmikar B, Siva Teja G, Chaitanya Sai G, Raghavendra Reddy, “Information Gathering and FootPrinting Framework for Penetration Testing using Shell Script,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.14, pp.239-244, 2019.

MLA Style Citation: Gopichand D, Lakshmikar B, Siva Teja G, Chaitanya Sai G, Raghavendra Reddy "Information Gathering and FootPrinting Framework for Penetration Testing using Shell Script." International Journal of Computer Sciences and Engineering 07.14 (2019): 239-244.

APA Style Citation: Gopichand D, Lakshmikar B, Siva Teja G, Chaitanya Sai G, Raghavendra Reddy, (2019). Information Gathering and FootPrinting Framework for Penetration Testing using Shell Script. International Journal of Computer Sciences and Engineering, 07(14), 239-244.

BibTex Style Citation:
@article{D_2019,
author = {Gopichand D, Lakshmikar B, Siva Teja G, Chaitanya Sai G, Raghavendra Reddy},
title = {Information Gathering and FootPrinting Framework for Penetration Testing using Shell Script},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {07},
Issue = {14},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {239-244},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1129},
doi = {https://doi.org/10.26438/ijcse/v7i14.239244}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i14.239244}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1129
TI - Information Gathering and FootPrinting Framework for Penetration Testing using Shell Script
T2 - International Journal of Computer Sciences and Engineering
AU - Gopichand D, Lakshmikar B, Siva Teja G, Chaitanya Sai G, Raghavendra Reddy
PY - 2019
DA - 2019/05/15
PB - IJCSE, Indore, INDIA
SP - 239-244
IS - 14
VL - 07
SN - 2347-2693
ER -

           

Abstract

Now a days Cyber threats are the costliest threats happening globally. Lets assume a scenario where a user surfs the internet, share files, download files, upload files without any basic security precautions. In this case he/she can get infected with virus and also shares it in form of physical drives or any upload of file, this will also infect other end users. To prevent this stuff in the organisations they conduct a monthly or quarterly security audit which will help them to maintain their systems secure.

Key-Words / Index Term

Information Gathering, Penetration Testing, Automation, Footprinting, Ethical Hacking

References

[1] Andress, Mandy. ”Network scanners pinpoint problems.” Network World (2002).
[2] O. Arkin, ”ICMP Usage In Scanning”, The SysSecurity Group, June 2001.
[3] R. Farrow, ”System Fingerprinting With Nmap”, Network Magazine, November 2000.
[4] Smith, Yurick, Doss Ethical Hacking IEEE Conference Publication, DOI: 10.1147/sj. 403.0769, pp. 769-780 - 2014.
[5] Behera, Dash Ethical Hacking: A Security Assessment Tool to Uncover Loopholes and Vulnerabilities in Network and to Ensure Protection to the System , International Journal of Innovations & Advancement in Computer Science, Vol 4, pp. 54-61 - 2015.
[6] Digital Defenders Document on Cyber security - 2018.
[7] Hall, Gary, and Erin Watson. Hacking: Computer Hacking, Security Testing, Penetration Testing and Basic Security. CreateSpace Independent Publishing Platform, 2016.
[8] Lin, Huaqing, Zheng Yan, Yu Chen, and Lifang Zhang. ”A survey on network security-related data collection technologies.” IEEE Access 6 (2018): 18345-18365.
[9] Fessi, B. A., S. Benabdallah, M. Hamdi, S. Rekhis, and N. Boudriga. ”Data collection for information security system.” In 2010 Second Inter-national Conference on Engineering System Management and Applica-tions, pp. 1-8. IEEE, 2010.
[10] Guo, Fanglu, Yang Yu, and Tzi-cker Chiueh. ”Automated and safe vulnerability assessment.” In 21st Annual Computer Security Applications Conference (ACSAC’05), pp. 10-pp. IEEE, 2005.
[11] Wotawa, Franz. ”On the Automation of Security Testing.” In 2016 International Conference on Software Security and Assurance (ICSSA), pp. 11-16. IEEE, 2016.
[12] McGraw, Gary. ”Automated code review tools for security.” Computer 41, no. 12 (2008): 108-111.
[13] Urias, Vincent E., William MS Stout, Jean Luc-Watson, Cole Grim, Lorie Liebrock, and Monzy Merza. ”Technologies to enable cyber decep-tion.” In 2017 International Carnahan Conference on Security Technology (ICCST), pp. 1-6. IEEE, 2017.