Published July 26, 2022 | Version v1
Conference paper Open

Detection and Evaluating penetration testing using Metasploit and Wireshark

  • 1. Amal Jyothi College of Engineering

Description

Abstract — Cybercriminals and ethical hackers can both use the sophisticated Metasploit framework to scan servers and networks for systemic weaknesses. Testing has been accomplished by experimentation on a live network that Wireshark has examined. A strong contender for future development into a reliable intrusion detection system has been highlighted by inferences that clearly demonstrate Wireshark's capabilities. In that class, we utilised Wireshark in most, if not all, of our assignments and tests because it was an effective tool for analysing IP protocols. Since taking Intro to Data Networks and the Internet, I've been utilising Wireshark to determine the causes of specific computer networking problems. In addition, I've learned that Wireshark may be used for more.  

Files

Detection and Evaluating penetration testing using Metasploit and Wireshark.pdf