Penetration testing and mitigation of vulnerabilities windows server
Cyber attack has become a major concern over the past few years. While the technical capability to attack has declined, hacking tools-both simple and comprehensive-are themselves evolving rapidly. Certain approaches are necessary to protect a system from cyber threats. This work engages with compreh...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Femto Technique Co., Ltd.
2016
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/70178/1/Mohd.YazidIdris2014_Penetrationtestingandmitigation.pdf http://eprints.utm.my/id/eprint/70178/ https://www.researchgate.net/publication/290497592 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Teknologi Malaysia |
Language: | English |
Summary: | Cyber attack has become a major concern over the past few years. While the technical capability to attack has declined, hacking tools-both simple and comprehensive-are themselves evolving rapidly. Certain approaches are necessary to protect a system from cyber threats. This work engages with comprehensive penetration testing in order to find vulnerabilities in the Windows Server and exploit them. Some forms of method penetration testing have been used in this experiment, including reconnaissance probes, brute force attacks based on password guessing, implanting malware to create a backdoorfor escalating privileges, and flooding the target. This experiment was focused on gaining access in order to ascertainthe identities of hackers and thus better understand their methods and performed penetration testing to evaluate security flaws in the Windows Server, which is a famous OS for web applications. It is expected that this work will serve as aguideline for practitioners who want to prepare and protect their systems before putting them online |
---|