An Analysis of Tools and Techniques Employed In A Cyber Security Penetration Testing
PDF

Keywords

Penetration Testing
Risk Assessment
Vulnerability Scanning
Metaspoitable2
Attacks

How to Cite

Azeddien M. Sllame, & Sumu Mohamed Ramadan Sharif. (2025). An Analysis of Tools and Techniques Employed In A Cyber Security Penetration Testing . Sebha University Conference Proceedings, 4(1), 29–33. https://doi.org/10.51984/sucp.v4i1.3852

Abstract

This paper describes a penetration testing process in terms of risk assessment, vulnerability scanning, and analysis of pen testing techniques applied via tools. Starting the attack by issuing Nmap command to discover insecure running services and their related ports, to start finding vulnerabilities and do pen testing by exploiting them then analyzing the results. The whole process is performed on virtual environment to show the effectiveness of pen testing in protecting organizations against vulnerabilities’ exploitation to reduce the risk to a minimally acceptable level.               

https://doi.org/10.51984/sucp.v4i1.3852
PDF
Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

Copyright (c) 2025 Sebha University Conference Proceedings