Beta
329013

Mechanisms of system penetration: Review

Article

Last updated: 28 Dec 2024

Subjects

-

Tags

• Computer and Network Security

Abstract

Given the escalating frequency of cyber-attacks worldwide, network security has become a pressing concern. Consequently, a substantial amount of "ethical hackers" have offered their services voluntarily to develop strategies and scripts to combat security problems. The necessity for more efficient management of security systems has led to the development of penetration testing, as it is time-consuming to maintain and monitor attacks on each hardware and software within an enterprise. Several research organisations have developed algorithms to protect networks based on their size, kind, and purpose. This study involves the construction of a simulated organisational framework to examine the practise of penetration testing within a live server-client environment. The Border Gateway Protocol (BGP) was selected as the routing protocol due to its extensive usage in contemporary networks. In addition, BGP exhibits low internal vulnerabilities, which enhances the overall security assessment. This research introduces computer-based attacks and actual network-based attacks, together with their corresponding defence methods. The article demonstrates the process of conducting penetration testing on a specific BGP network. Both internal and external network attacks are used to produce packets, exploits, and payloads. Firstly, we commence by delineating all the sub-fields within the penetration testing domain, together with its respective requirements and repercussions. This paper focuses on several techniques used to attack routers, switches, and physical client workstations in the context of educational and learning research.

DOI

10.21608/njccs.2023.248409.1024

Keywords

GNS3, DMZ, Python Code, LAND Attack, STP

Authors

First Name

Hesham

Last Name

Sakr

MiddleName

A.

Affiliation

Assistant professor-ECE-Department- Nile higher institute of engineering- Egypt

Email

heshamsakr535@nilehi.edu.eg

City

-

Orcid

0000-0001-6241-4397

First Name

Magda

Last Name

I. El-Afifi

MiddleName

-

Affiliation

Assistant Professor, ECE department, Nile Higher Institute of Engineering and Technology, Mansoura, Egypt

Email

magdaebraheem@gmail.com

City

-

Orcid

-

Volume

6

Article Issue

1

Related Issue

46450

Issue Date

2023-12-01

Receive Date

2023-12-03

Publish Date

2023-12-01

Page Start

41

Page End

48

Print ISSN

2805-2366

Online ISSN

2805-2374

Link

https://njccs.journals.ekb.eg/article_329013.html

Detail API

https://njccs.journals.ekb.eg/service?article_code=329013

Order

329,013

Type

Original Article

Type Code

2,134

Publication Type

Journal

Publication Title

Nile Journal of Communication and Computer Science

Publication Link

https://njccs.journals.ekb.eg/

MainTitle

Mechanisms of system penetration: Review

Details

Type

Article

Created At

28 Dec 2024