A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Kalpana, G.
- Exploiting Linux Service Misconfiguration
Authors
1 Computer Science and Engineering, Dr. MGR Educational and Research Institute, Maduravoyal, Chennai TamilNadu, IN
Source
Software Engineering, Vol 7, No 7 (2015), Pagination: 201-203Abstract
This paper proposes to show vulnerabilities in the Linux servers and service running on Red Hat Linux. The default configuration on Linux server is more vulnerability in the services running on Red Hat, not to the knowledge of system administrator. By pen testing in kali Linux the result shows that there will be many ports open. In Linux Red hat servers each services has its own vulnerability. This paper focuses on FTP service vulnerability, where payload is created for ftp service in Kali Linux and Red Hat server is compromised, by gaining the ischolar_main credential of the particular Red Hat server. Here in Red Hat server lot of changes can be done in ischolar_main file system and to any normal users, files and system information can be altered. By enhancing the security policies patches are made and the FTP server and the services is made normally available for users running.
Keywords
Vulnerability, Exploit, Payload, Red Hat Linux, Kali Linux, VSFTPD.- A Study on Routing Attacks and Security Measures in MANET
Authors
1 Sri Ramakrishna College of Arts & Science for Women, Coimbatore-641044, IN
Source
Software Engineering, Vol 5, No 12 (2013), Pagination: 392-395Abstract
Mobile ad hoc networks (MANETs) are a set of mobile nodes which are self-configuring and connected by wireless links routinely used to evaluate and manage trust relationships between network nodes and enhance network security. Due to the lack of a central power, securitizing the routing process becomes a difficult task however trust management frameworks themselves are vulnerable to attacks in which results in performance degradation. The study is to present secure of ad hoc networks from various types of routing attacks and improved by various measures to handle different types of malicious behavior that can be enforced to overcome it.