SUST Repository

Penetration Testing: An Ethical Hacking Plan for Sudan University of Sciences and Technology Network

Show simple item record

dc.contributor.author Elsideeg, Sideeg Abdelbage
dc.contributor.author Supervisor - Mamoun M.A. Suliman
dc.date.accessioned 2015-03-29T11:31:40Z
dc.date.available 2015-03-29T11:31:40Z
dc.date.issued 2011-11-01
dc.identifier.citation Elsideeg,Sideeg Abdelbage .Penetration Testing: An Ethical Hacking Plan for Sudan University of Sciences and Technology Network / Sideeg Abdelbage Elsideeg;Mamoun M.A. Suliman.-Khartoum: Sudan University of Science and Technology, College of Engineering, 2011 .-119p :ill ;28cm .-M.Sc. en_US
dc.identifier.uri http://repository.sustech.edu/handle/123456789/10799
dc.description Thesis en_US
dc.description.abstract Computer systems are usually vulnerable to attacks of malicious hackers and crackers. Penetration testing is a form of stress testing, since it provides a way to assess the computer system, and points out any vulnerabilities that can be exploited by hackers. It can find flaws in the security system. It is a valued assurance assessment tool that can be of great help for the system administrators, as it will help them tighten up their system security. It is an area worthy of research because it crosses a lot of IT domains, technologies, specializations and disciplines. Despite its critical importance, we find a dearth of research in this area. This research is a small attempt to explore the depth of this area. We began by discussing and differencing between ethical hacking and malicious hacking, and then we reviewed the methodologies used in work of penetration test as well as a detailed description of the tools used in it. As performed this research (penetration testing) on SUST network. We thought, behaved and used the same tools and techniques that malicious hackers used. We followed Certified Ethical Hacker (Five stages) methodology using black box testing with remote network ethical hacking type. This application has been represented by two phases of the overall methodology that describes the five stages. The result of the test is rich with information that describes the current security situation of the SUST network. The simplicity of the information gathering process and the amount of information and the number of findings with high level risk, showed how much SUST network is vulnerable to attacks of malicious hackers en_US
dc.description.sponsorship Sudan University of Science and Technology en_US
dc.language.iso en en_US
dc.publisher Sudan University of Science and Technology en_US
dc.subject Computer Engineering en_US
dc.subject Penetration Testing en_US
dc.subject Piracy legitimacy en_US
dc.title Penetration Testing: An Ethical Hacking Plan for Sudan University of Sciences and Technology Network en_US
dc.title.alternative اختبار الإختراق: خطة القرصنة الشرعية لشبكة جامعة السودان للعلوم والتكنولوجيا en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search SUST


Browse

My Account