Implementing Penetration Testing in Simulation Environment.
DOI:
https://doi.org/10.61688/jev.v4i2.137Keywords:
Kali, NMAP, Metasploitable 2, Penetration Testing, VulnerabilitiesAbstract
Penetration testing or pen testing is crucial to protect systems from cyber risk attacks due to the vulnerabilities in information security. This article presents the implementation of basic penetration testing which focuses on the scanning phase by using two virtual machines which are Kali Linux and Metasploitable 2 installed virtually in a local machine through VirtualBox as one of the virtualization software to simulate the environment. Nmap which is one of Kali Linux tools was used to perform the scanning purpose on Metasploitable 2 as a vulnerable system or target machine. The experiment was conducted in a secured environment thus requiring a secured setting in configuring the VirtualBox. The experimental results show a list of open ports from the Metasploitable 2 machine and thus suggest basic countermeasures to secure the systems. Using Kali Linux as one of the penetration testing tools is beneficial for finding vulnerabilities and alerting pen testers to fix them before attackers can take advantage of them.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Rukhiyah Adnan, Wan Asiah Wan Muhamad Tahir
This work is licensed under a Creative Commons Attribution 4.0 International License.
<a rel="license" href="http://creativecommons.org/licenses/by/4.0/"><img alt="Creative Commons License" style="border-width:0" src="https://i.creativecommons.org/l/by/4.0/88x31.png" /></a><br />This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</a>.