Open Access iconOpen Access

ARTICLE

crossmark

Efficacy of Unconventional Penetration Testing Practices

Bandar Abdulrhman Bin Arfaj1, Shailendra Mishra2,*, Mohammed Alshehri1

1 Department of Information Technology, College of Computer and Information Sciences, Majmaah University, Majmaah, 11952, Saudi Arabia
2 Department of Computer Engineering, College of Computer and Information Sciences, Majmaah University, Majmaah, 11952, Saudi Arabia

* Corresponding Author: Shailendra Mishra. Email: email

Intelligent Automation & Soft Computing 2022, 31(1), 223-239. https://doi.org/10.32604/iasc.2022.019485

Abstract

The financial and confidential cost of cyberattack has presented a significant loss to the organization and government where the privacy of worthless information has become vulnerable to cyber threat. In terms of efforts implemented to avoid this risk, the cyberattack continues to evolve, making the cybersecurity systems weekend. This has necessitated the importance of comprehensive penetration testing, assessment techniques, and tools to analyze and present the currently available unconventional penetration techniques and tactics to test and examine their key features and role in supporting cybersecurity and measure their effectiveness. The importance of cyberspace and its value make it an eminent target for attackers to exploit any vulnerability they may encounter in the respective system. Due to the cybersecurity risks, robust security measures need to be put in place to protect the system in question. Penetration testing is one such security measure that aims to uncover the security vulnerabilities in the system. Due to the dynamic aspect of cyberspace and technology, advanced or more unusual penetration testing mechanisms need to be employed to deal with the emerging vulnerabilities and security threats in cyberspace. This research explores and utilizes the conventional and unconventional penetration testing methods and identifies the study's main objectives to improve the current penetration testing techniques to increase security effectiveness and efficiency. It also calculates vulnerabilities and risks based on Common Vulnerability Scoring System (CVSS) scores and their impact on confidentiality, integrity, and availability. It proposes a Wi-Fi penetration testing approach based on Kali Linux. It also highlights the conventional and unconventional penetration testing approaches and justifies the essence of penetration testing over cyberattack cases. Due to the dynamic changes in technology, the conventional penetration testing method does not seem to be efficient to achieve its goal.

Keywords


Cite This Article

APA Style
Arfaj, B.A.B., Mishra, S., Alshehri, M. (2022). Efficacy of unconventional penetration testing practices. Intelligent Automation & Soft Computing, 31(1), 223-239. https://doi.org/10.32604/iasc.2022.019485
Vancouver Style
Arfaj BAB, Mishra S, Alshehri M. Efficacy of unconventional penetration testing practices. Intell Automat Soft Comput . 2022;31(1):223-239 https://doi.org/10.32604/iasc.2022.019485
IEEE Style
B.A.B. Arfaj, S. Mishra, and M. Alshehri, “Efficacy of Unconventional Penetration Testing Practices,” Intell. Automat. Soft Comput. , vol. 31, no. 1, pp. 223-239, 2022. https://doi.org/10.32604/iasc.2022.019485



cc Copyright © 2022 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 2116

    View

  • 1252

    Download

  • 0

    Like

Share Link