Skip to main content

Cyber Threat Prevention: Enhancing Resilience with VAPT Solutions

Page 1

International Research Journal of Engineering and Technology (IRJET)

e-ISSN: 2395-0056

Volume: 11 Issue: 05 | May 2024

p-ISSN: 2395-0072

www.irjet.net

Cyber Threat Prevention: Enhancing Resilience with VAPT Solutions G Swaroop1, Harish Budarpu2, Manasa B N3, Prof. Meghashree N4 1 2 3Student Scholar, Dept. of Computer Science and Engineering, Atria Institute of Technology, Karnataka, India 4Asst.Professor, Dept. of Computer Science and Engineering, Atria Institute of Technology, Karnataka, India

---------------------------------------------------------------------***---------------------------------------------------------------------

Abstract - Computers, mobile devices, and other networks

number of tools it examined. Future studies can investigate a wider variety of instruments and expand the assessment to different kinds of applications in order to get around these limitations. [2] A paper's main focus is on penetration testing and vulnerability assessment. For these tasks, the authors suggest an implementation of a solution. As part of the methodology, a portable testing platform for penetration testing and vulnerability analysis is designed and developed. The paper's limitations include its particular focus on a portable solution and its requirement for additional testing and validation of the recommended solution. provides a thorough examination of numerous cyberattacks. [3] The research methodology employed in this study entails a review and analysis of various cyber-attack types, covering their attributes, methods, and possible consequences. [4] The reporting and analysis of wireless network security test results using Kali Linux is the main goal of this study. Utilising Raspberry-Pi and Kali devices, experiments are conducted as part of the methodology to assess wireless network security. The study has several limitations, such as its narrow focus on Raspberry Pi devices and the need for more extensive validation of the results. To overcome these limitations, even more research can compare evaluations with other security assessment methods using different hardware platforms. [5] A comparative analysis of web application security aspects is presented in this paper. Key security parameters were identified and current trends in web application security were reviewed as part of the research techniques. The study's shortcomings include its emphasis on particular security criteria and the absence of a thorough assessment of the state-of-the-art methods for web application security. Future researchers can include a wider range of security parameters and compare the effectiveness of various security techniques in order to overcome these limitations. [6] This paper primarily focuses on information gathering and pen testing tools. Analyzing current information-gathering methods and penetration testing tools is part of the methodology. The primary limitations of the paper are the narrow range of information collection methods discussed and the need for further empirical validation of the instruments. To overcome these constraints, future investigators can investigate supplementary data collection methods and carry out empirical investigations to verify and contrast various instruments. [7] The implementation and comparison of various password cracking tools is the main topic of this paper. The process entails choosing well-known passwordcracking software and assessing how well it performs and cracks passwords. The small number of tools examined and

and systems are not sufficiently secure and are open to various cyberthreats. Every year, there are more and more cyberthreats. Vulnerability assessment is the process of locating the weaknesses in networks and systems. Vulnerability assessment aids in offering the required countermeasures to online threats. It entails identifying vulnerabilities, such as those in networks, physical systems, and applications, and evaluating the risks that come with them. This paper presents a new method for performing cyberattack analysis by utilizing penetration testing and vulnerability assessment techniques. The suggested approach makes use of a variety of Kali Linux tools, combined with an intuitive menu system and Python modules. A comparative study is conducted between the results of a major proposed approach and Kali Linux's built-in tools. Notably, the results show significant advancements in a number of critical domains, such as information gathering, network and website testing, system modifications, sniffing, and spoofing. These enhancements make cyber-attack analysis more effective and efficient overall and provide valuable data for more effective security measures. Key Words: cyber security, cyber-attack prevention, vulnerability assessment, penetration testing.

1. INTRODUCTION Cyber-attacks and threats are defined as a broad range of actions conducted by individuals who typically use malicious software to gain access to a person's or an organization's network or systems. They may even result in data loss, system crashes, and poor performance when computer systems malfunction. Cyberattacks can be carried out from any location by an individual or a group. Hackers and cybercriminals are the ones who carry out these types of cyberattacks. We can use the tools that Kali Linux provides to address these vulnerabilities. We have presented a menubased interface for vulnerability assessment and penetration testing using Python modules in this paper.

2. Literature Review [1] A comparison of web application automation testing tools is presented in this paper. The popular automation testing tools were chosen for this study their features, usability, performance, ease of use, and compatibility with web applications were assessed. The study's limitations include its narrow focus on web applications and the small

© 2024, IRJET

|

Impact Factor value: 8.226

|

ISO 9001:2008 Certified Journal

|

Page 613


Turn static files into dynamic content formats.

Create a flipbook