International Journal of Advanced Research in Computer Science and Electronics Engineering
Security assessments can mean different things to different people. This paper discusses common security assessments with open source tools. Each tools of the paper will address a phase of the different levels of security assessments. The paper is written for security practitioners and pen testers, and of course, students who have interested in security assessment. So, it is concentrated on open source tools, and thereby, commercial products are not mentioned. It is used to validate the security of a network.