Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{149702, author = {Priyanka Revar and Dr.Ravi Sheth}, title = {Network Auditing to Secure the Organization Using VAPT}, journal = {International Journal of Innovative Research in Technology}, year = {}, volume = {7}, number = {1}, pages = {473-478}, issn = {2349-6002}, url = {https://ijirt.org/article?manuscript=149702}, abstract = {This paper describes Penetration Testing Tools and Approaches to finding the vulnerability of any organization Web Application or network. The paper contains the steps for Penetration Testing and how to secure the web application, organization or network. There are many tools are used for vulnerability finding and penetration testing. It contains the Approaches to provide the security solution for network and it’s infra by finding the loopholes. Providing a Network diagram to overcome network traffic. These steps are used in penetration testing is Pre-engagement interaction, information gathering, vulnerability analysis, exploitation of Vulnerability, Reporting. This methodology is used to conduct the Penetration testing of web application and network Auditing. In this paper we are performing Network Audit and give the network solution by reconstructing the network before an attacker are used this vulnerability and exploits it.}, keywords = {Network Auditing, Vulnerability Assessment & Penetration Testing }, month = {}, }
Cite This Article
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry