Attack and vulnerability penetration testing: freebsd

Computer system security has become a major concern over the past few years. Attacks, threats or intrusions, against computer system and network have become commonplace events. However, there are some system devices and other tools that are available to overcome the threat of these attacks. Currentl...

Full description

Saved in:
Bibliographic Details
Main Authors: Stiawan, Deris, Idris, Mohd. Yazid, Abdullah, Abdul Hanan
Format: Article
Language:English
Published: Universitas Ahmad Dahlan 2013
Subjects:
Online Access:http://eprints.utm.my/id/eprint/50318/1/Mohd.YazidIdris2013_Attackandvulnerabilitypenetration.pdf
http://eprints.utm.my/id/eprint/50318/
http://dx.doi.org/10.12928/telkomnika.v11i2.942
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Teknologi Malaysia
Language: English
Description
Summary:Computer system security has become a major concern over the past few years. Attacks, threats or intrusions, against computer system and network have become commonplace events. However, there are some system devices and other tools that are available to overcome the threat of these attacks. Currently, cyber attack is a major research and inevitable. This paper presents some steps of penetration in FreeBSD operating system, some tools and new steps to attack used in this experiment, probes for reconnaissance, guessing password via brute force, gaining privilege access and flooding victim machine to decrease availability. All these attacks were executed and infiltrate within the environment of Intrusion Threat Detection Universiti Teknologi Malaysia (ITD UTM) data set. This work is expected to be a reference for practitioners to prepare their systems from Internet attacks