Information Gathering and FootPrinting Framework for Penetration Testing using Shell Script
Gopichand D1 , Lakshmikar B2 , Siva Teja G3 , Chaitanya Sai G4 , Raghavendra Reddy5
Section:Survey Paper, Product Type: Journal Paper
Volume-07 ,
Issue-14 , Page no. 239-244, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si14.239244
Online published on May 15, 2019
Copyright © Gopichand D, Lakshmikar B, Siva Teja G, Chaitanya Sai G, Raghavendra Reddy . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Citation
IEEE Style Citation: Gopichand D, Lakshmikar B, Siva Teja G, Chaitanya Sai G, Raghavendra Reddy, “Information Gathering and FootPrinting Framework for Penetration Testing using Shell Script,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.14, pp.239-244, 2019.
MLA Citation
MLA Style Citation: Gopichand D, Lakshmikar B, Siva Teja G, Chaitanya Sai G, Raghavendra Reddy "Information Gathering and FootPrinting Framework for Penetration Testing using Shell Script." International Journal of Computer Sciences and Engineering 07.14 (2019): 239-244.
APA Citation
APA Style Citation: Gopichand D, Lakshmikar B, Siva Teja G, Chaitanya Sai G, Raghavendra Reddy, (2019). Information Gathering and FootPrinting Framework for Penetration Testing using Shell Script. International Journal of Computer Sciences and Engineering, 07(14), 239-244.
BibTex Citation
BibTex Style Citation:
@article{D_2019,
author = {Gopichand D, Lakshmikar B, Siva Teja G, Chaitanya Sai G, Raghavendra Reddy},
title = {Information Gathering and FootPrinting Framework for Penetration Testing using Shell Script},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {07},
Issue = {14},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {239-244},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1129},
doi = {https://doi.org/10.26438/ijcse/v7i14.239244}
publisher = {IJCSE, Indore, INDIA},
}
RIS Citation
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i14.239244}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1129
TI - Information Gathering and FootPrinting Framework for Penetration Testing using Shell Script
T2 - International Journal of Computer Sciences and Engineering
AU - Gopichand D, Lakshmikar B, Siva Teja G, Chaitanya Sai G, Raghavendra Reddy
PY - 2019
DA - 2019/05/15
PB - IJCSE, Indore, INDIA
SP - 239-244
IS - 14
VL - 07
SN - 2347-2693
ER -




Abstract
Now a days Cyber threats are the costliest threats happening globally. Lets assume a scenario where a user surfs the internet, share files, download files, upload files without any basic security precautions. In this case he/she can get infected with virus and also shares it in form of physical drives or any upload of file, this will also infect other end users. To prevent this stuff in the organisations they conduct a monthly or quarterly security audit which will help them to maintain their systems secure.
Key-Words / Index Term
Information Gathering, Penetration Testing, Automation, Footprinting, Ethical Hacking
References
[1] Andress, Mandy. ”Network scanners pinpoint problems.” Network World (2002).
[2] O. Arkin, ”ICMP Usage In Scanning”, The SysSecurity Group, June 2001.
[3] R. Farrow, ”System Fingerprinting With Nmap”, Network Magazine, November 2000.
[4] Smith, Yurick, Doss Ethical Hacking IEEE Conference Publication, DOI: 10.1147/sj. 403.0769, pp. 769-780 - 2014.
[5] Behera, Dash Ethical Hacking: A Security Assessment Tool to Uncover Loopholes and Vulnerabilities in Network and to Ensure Protection to the System , International Journal of Innovations & Advancement in Computer Science, Vol 4, pp. 54-61 - 2015.
[6] Digital Defenders Document on Cyber security - 2018.
[7] Hall, Gary, and Erin Watson. Hacking: Computer Hacking, Security Testing, Penetration Testing and Basic Security. CreateSpace Independent Publishing Platform, 2016.
[8] Lin, Huaqing, Zheng Yan, Yu Chen, and Lifang Zhang. ”A survey on network security-related data collection technologies.” IEEE Access 6 (2018): 18345-18365.
[9] Fessi, B. A., S. Benabdallah, M. Hamdi, S. Rekhis, and N. Boudriga. ”Data collection for information security system.” In 2010 Second Inter-national Conference on Engineering System Management and Applica-tions, pp. 1-8. IEEE, 2010.
[10] Guo, Fanglu, Yang Yu, and Tzi-cker Chiueh. ”Automated and safe vulnerability assessment.” In 21st Annual Computer Security Applications Conference (ACSAC’05), pp. 10-pp. IEEE, 2005.
[11] Wotawa, Franz. ”On the Automation of Security Testing.” In 2016 International Conference on Software Security and Assurance (ICSSA), pp. 11-16. IEEE, 2016.
[12] McGraw, Gary. ”Automated code review tools for security.” Computer 41, no. 12 (2008): 108-111.
[13] Urias, Vincent E., William MS Stout, Jean Luc-Watson, Cole Grim, Lorie Liebrock, and Monzy Merza. ”Technologies to enable cyber decep-tion.” In 2017 International Carnahan Conference on Security Technology (ICCST), pp. 1-6. IEEE, 2017.