Please use this identifier to cite or link to this item: https://repository.sustech.edu/handle/123456789/10799
Title: Penetration Testing: An Ethical Hacking Plan for Sudan University of Sciences and Technology Network
Other Titles: اختبار الإختراق: خطة القرصنة الشرعية لشبكة جامعة السودان للعلوم والتكنولوجيا
Authors: Elsideeg, Sideeg Abdelbage
Supervisor - Mamoun M.A. Suliman
Keywords: Computer Engineering
Penetration Testing
Piracy legitimacy
Issue Date: 1-Nov-2011
Publisher: Sudan University of Science and Technology
Citation: Elsideeg,Sideeg Abdelbage .Penetration Testing: An Ethical Hacking Plan for Sudan University of Sciences and Technology Network / Sideeg Abdelbage Elsideeg;Mamoun M.A. Suliman.-Khartoum: Sudan University of Science and Technology, College of Engineering, 2011 .-119p :ill ;28cm .-M.Sc.
Abstract: Computer systems are usually vulnerable to attacks of malicious hackers and crackers. Penetration testing is a form of stress testing, since it provides a way to assess the computer system, and points out any vulnerabilities that can be exploited by hackers. It can find flaws in the security system. It is a valued assurance assessment tool that can be of great help for the system administrators, as it will help them tighten up their system security. It is an area worthy of research because it crosses a lot of IT domains, technologies, specializations and disciplines. Despite its critical importance, we find a dearth of research in this area. This research is a small attempt to explore the depth of this area. We began by discussing and differencing between ethical hacking and malicious hacking, and then we reviewed the methodologies used in work of penetration test as well as a detailed description of the tools used in it. As performed this research (penetration testing) on SUST network. We thought, behaved and used the same tools and techniques that malicious hackers used. We followed Certified Ethical Hacker (Five stages) methodology using black box testing with remote network ethical hacking type. This application has been represented by two phases of the overall methodology that describes the five stages. The result of the test is rich with information that describes the current security situation of the SUST network. The simplicity of the information gathering process and the amount of information and the number of findings with high level risk, showed how much SUST network is vulnerable to attacks of malicious hackers
Description: Thesis
URI: http://repository.sustech.edu/handle/123456789/10799
Appears in Collections:Masters Dissertations : Engineering

Files in This Item:
File Description SizeFormat 
Penetration Testing.pdftitle2.07 MBAdobe PDFView/Open
01 Network Security Assessment.pdf
  Restricted Access
search12.49 MBAdobe PDFView/Open Request a copy
02 Network Security Evaluation Using the NSA IEM .pdf
  Restricted Access
search7.48 MBAdobe PDFView/Open Request a copy
03 OReilly.Security.Power.Tools.Aug.2007.pdf
  Restricted Access
search12.34 MBAdobe PDFView/Open Request a copy
04 osstmm.en.2.2.pdf
  Restricted Access
search5.84 MBAdobe PDFView/Open Request a copy
Network.Security.Assessment.pdf
  Restricted Access
search6.19 MBAdobe PDFView/Open Request a copy
Hacking For Dummies (Wiley 2004).pdf
  Restricted Access
appendix9.53 MBAdobe PDFView/Open Request a copy
CEH.Official.Certified.Ethical.Hacker.Review.Guide.Exam.312-.pdf
  Restricted Access
appendix4.83 MBAdobe PDFView/Open Request a copy


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.