Please use this identifier to cite or link to this item: https://repository.sustech.edu/handle/123456789/10799
Full metadata record
DC FieldValueLanguage
dc.contributor.authorElsideeg, Sideeg Abdelbage
dc.contributor.authorSupervisor - Mamoun M.A. Suliman
dc.date.accessioned2015-03-29T11:31:40Z
dc.date.available2015-03-29T11:31:40Z
dc.date.issued2011-11-01
dc.identifier.citationElsideeg,Sideeg Abdelbage .Penetration Testing: An Ethical Hacking Plan for Sudan University of Sciences and Technology Network / Sideeg Abdelbage Elsideeg;Mamoun M.A. Suliman.-Khartoum: Sudan University of Science and Technology, College of Engineering, 2011 .-119p :ill ;28cm .-M.Sc.en_US
dc.identifier.urihttp://repository.sustech.edu/handle/123456789/10799
dc.descriptionThesisen_US
dc.description.abstractComputer systems are usually vulnerable to attacks of malicious hackers and crackers. Penetration testing is a form of stress testing, since it provides a way to assess the computer system, and points out any vulnerabilities that can be exploited by hackers. It can find flaws in the security system. It is a valued assurance assessment tool that can be of great help for the system administrators, as it will help them tighten up their system security. It is an area worthy of research because it crosses a lot of IT domains, technologies, specializations and disciplines. Despite its critical importance, we find a dearth of research in this area. This research is a small attempt to explore the depth of this area. We began by discussing and differencing between ethical hacking and malicious hacking, and then we reviewed the methodologies used in work of penetration test as well as a detailed description of the tools used in it. As performed this research (penetration testing) on SUST network. We thought, behaved and used the same tools and techniques that malicious hackers used. We followed Certified Ethical Hacker (Five stages) methodology using black box testing with remote network ethical hacking type. This application has been represented by two phases of the overall methodology that describes the five stages. The result of the test is rich with information that describes the current security situation of the SUST network. The simplicity of the information gathering process and the amount of information and the number of findings with high level risk, showed how much SUST network is vulnerable to attacks of malicious hackersen_US
dc.description.sponsorshipSudan University of Science and Technologyen_US
dc.language.isoenen_US
dc.publisherSudan University of Science and Technologyen_US
dc.subjectComputer Engineeringen_US
dc.subjectPenetration Testingen_US
dc.subjectPiracy legitimacyen_US
dc.titlePenetration Testing: An Ethical Hacking Plan for Sudan University of Sciences and Technology Networken_US
dc.title.alternativeاختبار الإختراق: خطة القرصنة الشرعية لشبكة جامعة السودان للعلوم والتكنولوجياen_US
dc.typeThesisen_US
Appears in Collections:Masters Dissertations : Engineering

Files in This Item:
File Description SizeFormat 
Penetration Testing.pdftitle2.07 MBAdobe PDFView/Open
01 Network Security Assessment.pdf
  Restricted Access
search12.49 MBAdobe PDFView/Open Request a copy
02 Network Security Evaluation Using the NSA IEM .pdf
  Restricted Access
search7.48 MBAdobe PDFView/Open Request a copy
03 OReilly.Security.Power.Tools.Aug.2007.pdf
  Restricted Access
search12.34 MBAdobe PDFView/Open Request a copy
04 osstmm.en.2.2.pdf
  Restricted Access
search5.84 MBAdobe PDFView/Open Request a copy
Network.Security.Assessment.pdf
  Restricted Access
search6.19 MBAdobe PDFView/Open Request a copy
Hacking For Dummies (Wiley 2004).pdf
  Restricted Access
appendix9.53 MBAdobe PDFView/Open Request a copy
CEH.Official.Certified.Ethical.Hacker.Review.Guide.Exam.312-.pdf
  Restricted Access
appendix4.83 MBAdobe PDFView/Open Request a copy


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.