Penetration Testing and Network Auditing: Linux
Along with the evolution of Internet and its new emerging services, the quantity and impact of attacks havebeen continuously increasing. Currently, the technical capability to attack has tended to decrease. On thecontrary, performances of hacking tools are evolving, growing, simple, comprehensive, a...
Gespeichert in:
Veröffentlicht in: | Journal of information processing systems 2015, 11(1), 35, pp.104-115 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Along with the evolution of Internet and its new emerging services, the quantity and impact of attacks havebeen continuously increasing. Currently, the technical capability to attack has tended to decrease. On thecontrary, performances of hacking tools are evolving, growing, simple, comprehensive, and accessible to thepublic. In this work, network penetration testing and auditing of the Redhat operating system (OS) arehighlighted as one of the most popular OS for Internet applications. Some types of attacks are from a differentside and new attack method have been attempted, such as: scanning for reconnaissance, guessing thepassword, gaining privileged access, and flooding the victim machine to decrease availability. Some analysesin network auditing and forensic from victim server are also presented in this paper. Our proposed systemaims confirmed as hackable or not and we expect for it to be used as a reference for practitioners to protecttheir systems from cyber-attacks. KCI Citation Count: 0 |
---|---|
ISSN: | 2092-805X 1976-913X 2092-805X |
DOI: | 10.3745/JIPS.03.0013 |