Penetration testing and network auditing: Linux
Along with the evolution of Internet and its new emerging services, the quantity and impact of attacks have been continuously increasing. Currently, the technical capability to attack has tended to decrease. On the contrary, performances of hacking tools are evolving, growing, simple, comprehensive,...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Published: |
Korea Information Processing Society
2015
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/58772/ http://dx.doi.org/10.3745/JIPS.03.0013 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Teknologi Malaysia |
id |
my.utm.58772 |
---|---|
record_format |
eprints |
spelling |
my.utm.587722021-08-19T04:45:17Z http://eprints.utm.my/id/eprint/58772/ Penetration testing and network auditing: Linux Stiawan, Deris Idris, Mohd. Yazid Abdullah, Abdul Hanan QA75 Electronic computers. Computer science Along with the evolution of Internet and its new emerging services, the quantity and impact of attacks have been continuously increasing. Currently, the technical capability to attack has tended to decrease. On the contrary, performances of hacking tools are evolving, growing, simple, comprehensive, and accessible to the public. In this work, network penetration testing and auditing of the Redhat operating system (OS) are highlighted as one of the most popular OS for Internet applications. Some types of attacks are from a different side and new attack method have been attempted, such as: scanning for reconnaissance, guessing the password, gaining privileged access, and flooding the victim machine to decrease availability. Some analyses in network auditing and forensic from victim server are also presented in this paper. Our proposed system aims confirmed as hackable or not and we expect for it to be used as a reference for practitioners to protect their systems from cyber-attacks. Korea Information Processing Society 2015 Article PeerReviewed Stiawan, Deris and Idris, Mohd. Yazid and Abdullah, Abdul Hanan (2015) Penetration testing and network auditing: Linux. Journal of Information Processing Systems, 11 (1). pp. 104-115. ISSN 1976-913X http://dx.doi.org/10.3745/JIPS.03.0013 DOI:10.3745/JIPS.03.0013 |
institution |
Universiti Teknologi Malaysia |
building |
UTM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Malaysia |
content_source |
UTM Institutional Repository |
url_provider |
http://eprints.utm.my/ |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Stiawan, Deris Idris, Mohd. Yazid Abdullah, Abdul Hanan Penetration testing and network auditing: Linux |
description |
Along with the evolution of Internet and its new emerging services, the quantity and impact of attacks have been continuously increasing. Currently, the technical capability to attack has tended to decrease. On the contrary, performances of hacking tools are evolving, growing, simple, comprehensive, and accessible to the public. In this work, network penetration testing and auditing of the Redhat operating system (OS) are highlighted as one of the most popular OS for Internet applications. Some types of attacks are from a different side and new attack method have been attempted, such as: scanning for reconnaissance, guessing the password, gaining privileged access, and flooding the victim machine to decrease availability. Some analyses in network auditing and forensic from victim server are also presented in this paper. Our proposed system aims confirmed as hackable or not and we expect for it to be used as a reference for practitioners to protect their systems from cyber-attacks. |
format |
Article |
author |
Stiawan, Deris Idris, Mohd. Yazid Abdullah, Abdul Hanan |
author_facet |
Stiawan, Deris Idris, Mohd. Yazid Abdullah, Abdul Hanan |
author_sort |
Stiawan, Deris |
title |
Penetration testing and network auditing: Linux |
title_short |
Penetration testing and network auditing: Linux |
title_full |
Penetration testing and network auditing: Linux |
title_fullStr |
Penetration testing and network auditing: Linux |
title_full_unstemmed |
Penetration testing and network auditing: Linux |
title_sort |
penetration testing and network auditing: linux |
publisher |
Korea Information Processing Society |
publishDate |
2015 |
url |
http://eprints.utm.my/id/eprint/58772/ http://dx.doi.org/10.3745/JIPS.03.0013 |
_version_ |
1709667344918249472 |