IJSRP, Volume 6, Issue 4, April 2016 Edition [ISSN 2250-3153]
P.D Panditharathna , K.T Jayatunge , A.Nirojan , S.Srikanth, Mr. Dhishan Dhammearatchi
In this era attacks against computer system has increased and increasing significantly. Exploit which means component that can harm the system can buy from black-market even. Most of the organization consider securing the data of their organization from security breaches. One of the way is hiring professional pen testers to find the vulnerability and fix such mitigating risks. To do this task pen testers using automated techniques to gather information of security breaches. Most of the companies willing to hire white,grey hat hackers which we called about as pen testers.