OPERATING SYSTEM SECURITY AND PENETRATION TESTING
الكلمات المفتاحية:
Array، Array، Array، Array، Arrayالملخص
Penetration testing is an integral part of any organization or individual that employs the use of Information Technology services. This ensures that their computing infrastructures are checked for vulnerabilities in a routine manner. This paper explains the processes and phases involved in ethical hacking. In addition, major penetration testing types available are also discussed. A Local Area Network (LAN) was designed in a virtual environment running Linux and Windows Operating Systems. We carried out a white box penetration test on the systems. Kali Linux; an open source Debian-based Linux distribution designed for penetration testing and digital forensics was used for the experiment. Several built-in tools in Kali Linux were used, while going through the main phases of penetration testing. Starting from the reconnaissance phase of the process, information about computers was gathered, the network was scanned for vulnerabilities in the scanning phase, and identified vulnerabilities were exploited in the third phase of the penetration test, which is gaining access. Backdoors to exploited system(s) were created to maintain access and event logs were deleted to prevent detection in the final phase of the process
منشور
كيفية الاقتباس
إصدار
القسم
كيفية الاقتباس
الأعمال الأكثر قراءة لنفس المؤلف/المؤلفين
- P. O. Ofem, T. I. Adebo, J. O. Agushaka, M. B. Umar, EMPIRICAL VALIDATION OF ONLINE FEATURES IN USER ACCEPTANCE OF WEB SHOPPING CENTERS IN NIGERIA: A PRELIMINARY STUDY , FULafia Journal of Science and Technology : مجلد 2 عدد 1 (2016): Fulafia Journal of Science and Technology (FJST)
- H. U. Adoga, H. A. Imam, A. Dauda, J. F. Og-bonoko, U. M. Bako, P. A. Ochang, J. O. Agushaka, Improved Security Techniques in Multi-Protocol Label Switching , FULafia Journal of Science and Technology : مجلد 5 عدد 2 (2019): Fulafia Journal of Science and Technology (FJST)
المؤلفات المشابهة
- O. I. Adebisi, A. I. Adejumobi, F. E. Okoye, R. A. Jokojeje, LEAST SQUARE REGRESSION METHOD FOR LOAD MANAGEMENT IN ELECTRICITY DISTRIBUTION NETWORK OF A 33 KV FEEDER AT FEDERAL UNIVERSITY OF AGRICULTURE ABEOKUTA, NIGERIA , FULafia Journal of Science and Technology : مجلد 4 عدد 2 (2018): Fulafia Journal of Science and Technology (FJST)
- O. Nnamdi, E. Adebimpe, B. Omodunbi, L. Nwobodo, U. Nduanya, F. Oyediji, DEVELOPMENT OF A DOOR LOCK SECURITY SYSTEM BASED ON AUTOMATIC SPEECH RECOGNITION , FULafia Journal of Science and Technology : مجلد 4 عدد 2 (2018): Fulafia Journal of Science and Technology (FJST)
- P. O. Alao, A. A. Okandeji, F. Onaifo, P. A. Sobukonla, O. A. Adekoya, O. A. Adekoya, O. A. Adekoya, FAULTS ANALYSIS OF 33KV ELECTRICITY DISTRIBUTION SYSTEM IN THE ABEOKUTA BUSINESS HUB , FULafia Journal of Science and Technology : مجلد 7 عدد 1 (2021): Fulafia Journal of Science and Technology (FJST)
- M. O. Oyeleye, A. O. melodi, LIGHTNING PROTECTIVE SYSTEM: SIZING OF INTERCEPTION, DOWN CONDUCTOR AND EARTHING NETWORKS ON NIGERIAN 11-132 KV SUBSTATIONS , FULafia Journal of Science and Technology : مجلد 7 عدد 1 (2021): Fulafia Journal of Science and Technology (FJST)
- O. I. Adebisi, A. I. Adejumobi, A. J. Olanipekun, O. H. Bello, DEVELOPMENT OF A FUEL LEVEL MEASURING SYSTEM FOR UNDERGROUND LIQUID TANKS , FULafia Journal of Science and Technology : مجلد 4 عدد 2 (2018): Fulafia Journal of Science and Technology (FJST)
- Ignatius Okakwu, RELIABILITY ANALYSIS OF A HYBRID PV/WIND/BATTERY SYSTEM USING EVENT TREE APPROACH , FULafia Journal of Science and Technology : مجلد 9 عدد 1 (2025): Vol. 9 No. 1 (March, 2025): Fulafia Journal of Science and Technology (FJST)
- M. B. Olajide, A. A. Okandeji, O. G. Olasunkanmi, A. M. Salawu, Z. O. Jagun, S. G. Ogunjobi, DESIGN AND IMPLEMENTATION OF A BALANCED THREE-PHASE POWER PROTECTION SYSTEM , FULafia Journal of Science and Technology : مجلد 5 عدد 2 (2019): Fulafia Journal of Science and Technology (FJST)
- K. A. Amusa, A. Adewusi, A. J. Olanipekun, DEVELOPMENT OF INFRARED-BASED LOW COST BIDIRECTIONAL COUNTER , FULafia Journal of Science and Technology : مجلد 4 عدد 2 (2018): Fulafia Journal of Science and Technology (FJST)
- A. M. Oyelakin, T. T. Salau-Ibrahim, B. S. Ogidan, R. D. Azeez, I. K. Ajiboye, PEER-TO-PEER BOTNETS: A SURVEY ON PROPAGATION, DETECTION AND DETECTION EVASION TECHNIQUES , FULafia Journal of Science and Technology : مجلد 5 عدد 2 (2019): Fulafia Journal of Science and Technology (FJST)
- Moshood A. Hambali, Beatrice A. Ayati, Yinusa A. Olasupo, Mu’awuya Dalhatu, Adesina A. Akinyemi, AN INTELLIGENT FEATURE-OPTIMIZED FRAMEWORK FOR DDoSATTACK DETECTION USING SVM and XGBOOST , FULafia Journal of Science and Technology : مجلد 10 عدد 1 (2026): Fulafia Journal of Science and Technology (FJST)
يمكنك أيضاً إبدأ بحثاً متقدماً عن المشابهات لهذا المؤلَّف.