Penetration testing and network auditing: Linux

Along with the evolution of Internet and its new emerging services, the quantity and impact of attacks have been continuously increasing. Currently, the technical capability to attack has tended to decrease. On the contrary, performances of hacking tools are evolving, growing, simple, comprehensive,...

Full description

Saved in:
Bibliographic Details
Main Authors: Stiawan, Deris, Idris, Mohd. Yazid, Abdullah, Abdul Hanan
Format: Article
Published: Korea Information Processing Society 2015
Subjects:
Online Access:http://eprints.utm.my/id/eprint/58772/
http://dx.doi.org/10.3745/JIPS.03.0013
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Teknologi Malaysia
id my.utm.58772
record_format eprints
spelling my.utm.587722021-08-19T04:45:17Z http://eprints.utm.my/id/eprint/58772/ Penetration testing and network auditing: Linux Stiawan, Deris Idris, Mohd. Yazid Abdullah, Abdul Hanan QA75 Electronic computers. Computer science Along with the evolution of Internet and its new emerging services, the quantity and impact of attacks have been continuously increasing. Currently, the technical capability to attack has tended to decrease. On the contrary, performances of hacking tools are evolving, growing, simple, comprehensive, and accessible to the public. In this work, network penetration testing and auditing of the Redhat operating system (OS) are highlighted as one of the most popular OS for Internet applications. Some types of attacks are from a different side and new attack method have been attempted, such as: scanning for reconnaissance, guessing the password, gaining privileged access, and flooding the victim machine to decrease availability. Some analyses in network auditing and forensic from victim server are also presented in this paper. Our proposed system aims confirmed as hackable or not and we expect for it to be used as a reference for practitioners to protect their systems from cyber-attacks. Korea Information Processing Society 2015 Article PeerReviewed Stiawan, Deris and Idris, Mohd. Yazid and Abdullah, Abdul Hanan (2015) Penetration testing and network auditing: Linux. Journal of Information Processing Systems, 11 (1). pp. 104-115. ISSN 1976-913X http://dx.doi.org/10.3745/JIPS.03.0013 DOI:10.3745/JIPS.03.0013
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Stiawan, Deris
Idris, Mohd. Yazid
Abdullah, Abdul Hanan
Penetration testing and network auditing: Linux
description Along with the evolution of Internet and its new emerging services, the quantity and impact of attacks have been continuously increasing. Currently, the technical capability to attack has tended to decrease. On the contrary, performances of hacking tools are evolving, growing, simple, comprehensive, and accessible to the public. In this work, network penetration testing and auditing of the Redhat operating system (OS) are highlighted as one of the most popular OS for Internet applications. Some types of attacks are from a different side and new attack method have been attempted, such as: scanning for reconnaissance, guessing the password, gaining privileged access, and flooding the victim machine to decrease availability. Some analyses in network auditing and forensic from victim server are also presented in this paper. Our proposed system aims confirmed as hackable or not and we expect for it to be used as a reference for practitioners to protect their systems from cyber-attacks.
format Article
author Stiawan, Deris
Idris, Mohd. Yazid
Abdullah, Abdul Hanan
author_facet Stiawan, Deris
Idris, Mohd. Yazid
Abdullah, Abdul Hanan
author_sort Stiawan, Deris
title Penetration testing and network auditing: Linux
title_short Penetration testing and network auditing: Linux
title_full Penetration testing and network auditing: Linux
title_fullStr Penetration testing and network auditing: Linux
title_full_unstemmed Penetration testing and network auditing: Linux
title_sort penetration testing and network auditing: linux
publisher Korea Information Processing Society
publishDate 2015
url http://eprints.utm.my/id/eprint/58772/
http://dx.doi.org/10.3745/JIPS.03.0013
_version_ 1709667344918249472