A systematic review of vulnerability analysis & penetration testing tools
Keywords:Social Engineering, Penetration Testing, Exploit, SQL Injection, Cross Site Scripting, Glass Box Testing.
In Computer Security, the term vulnerability refers as a flaw in the system which creates a hole, giving an attacker a chance of taking control over the system. Any Software, Web application or anything related to computer product is vulnerable to attack in different ways like code stealing, sniffing of packets, hijacking the network, making the system compromised etc. In order to avoid such attacks a constant check has to be done and the check has to be done through various Pen testing tools. Penetration tools are one which is used to perform security check on an application to find the presence of exploitable vulnerabilities. In this paper, we look over the penetration tools like CODEPULSE (the code stealer), ETTERCAP (the Sniffer and Hijacker) and made a systematic review of various websites which are vulnerable to SQL Injection and Cross-site Scripting.
 Improving Accuracy of Applications Fingerprinting on Local Net- works using NMAP-AMAP-ETTERCAP by Waheed Ali H. M. Ghanem School of Computer Sciences University Sains Malaysia (USM) and BahariBelaton School of Computer Sciences University Sains Malaysia (USM) Penang, Malaysia.
 Code Pulse: Real time code coverage for Penetration Testing Activities by Hassan Radwan, Kenneth Prole Secure Decisions Division Applied Visions, Inc. Northport, NY, USA.
 Hassan.Redwan, Ken. Prole â€œcode pulse: Real time Code Cover- age for penetration testing Activitiesâ€ IEEE.2015.
 Security Quality Assurance through Penetration Testing by Kamran Shaukat University of the Punjab, Jhelum Campus. Jhelum.