Open Access Open Access  Restricted Access Subscription Access

Compromising Systems:Implementing Hacking Phases


Affiliations
1 College of Information and Communications Technology,Holy Angel University, Angeles, Philippines
2 Future University, Khartoum, Sudan
 

In the cyber world more and more cyber-attacks are being perpetrated. Hackers have now become the warriors of the internet. They attack and do harmful things to compromised system. This paper will show the methodology use by hackers to gained access to system and the different tools used by them and how they are group based on their skills. It will identify exploits that can be used to attack a system and find mitigation to those exploits.

In addition, the paper discusses the actual implementation of the hacking phases with the virtual machines use in the process. The virtual machines specification is also listed. it will also provide means and insights on how to protect one system from being compromised.


Keywords

Compromised Systems, Hacking, Penetration Testing, Exploit, Vulnerability.
User
Notifications
Font Size

  • S. Begum and S. Kumar, “IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY A COMPREHENSIVE STUDY ON ETHICAL HACKING,” vol. 5, no. 8, pp. 214–219, 2016.
  • “Role of Ethical Hacking in System,” no. May, 2018.
  • “What is white hat? - Definition from WhatIs.com.” [Online]. Available: https://searchsecurity.techtarget.com/definition/white-hat. [Accessed: 14-Mar-2019].
  • “What is ethical hacker? - Definition from WhatIs.com.” [Online]. Available: https://searchsecurity.techtarget.com/definition/ethical-hacker. [Accessed: 14-Apr-2019].
  • “Types of Hackers and What They Do: White, Black, and Grey | EC-Council Official Blog.” [Online]. Available: https://blog.eccouncil.org/types-of-hackers-and-what-they-do-white-black-and-grey/. [Accessed: 14-Mar-2019].
  • “What is the Difference Between Black, White and Grey Hat Hackers?” [Online]. Available: https://us.norton.com/internetsecurity-emerging-threats-what-is-the-difference-between-black-white-and-grey-hat-hackers.html. [Accessed: 14-Mar-2019].
  • S. Satapathy and D. Ranjan Patra, “Ethical Hacking,” Int. J. Sci. Res. Publ., vol. 5, no. 6, pp. 2250– 3153, 2015.
  • C. C. Palmer, “Ethical hacking,” vol. 40, no. 3, pp. 769–780, 2001.
  • I.-C. MIHAI, “Penetration Tests on Virtual Environment,” Int. J. Inf. Secur. Cybercrime, vol. 1, no. 1, pp. 37–45, 2016.
  • B. Sahare, A. Naik, and S. Khandey, “Study Of Ethical Hacking,” vol. 2, no. 4, pp. 6–10, 2014.
  • D. Hafele, “Information Security Reading Room Three Different Shades of Ethical Hacking : Black , White and Gray In tu ll r igh,” 2019.
  • “Exploitable vulnerabilities #1 (MS08-067).” [Online]. Available: https://blog.rapid7.com/2014/02/03/new-ms08-067/. [Accessed: 14-Mar-2019].
  • “ Microsoft Security Bulletin MS08-067 - Critical | Microsoft Docs.” [Online]. Available: https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-067. [Accessed: 21-Mar-2019].

Abstract Views: 203

PDF Views: 102




  • Compromising Systems:Implementing Hacking Phases

Abstract Views: 203  |  PDF Views: 102

Authors

Marlon intal tayag
College of Information and Communications Technology,Holy Angel University, Angeles, Philippines
Maria emmalyn asuncion de vigal capuno
Future University, Khartoum, Sudan

Abstract


In the cyber world more and more cyber-attacks are being perpetrated. Hackers have now become the warriors of the internet. They attack and do harmful things to compromised system. This paper will show the methodology use by hackers to gained access to system and the different tools used by them and how they are group based on their skills. It will identify exploits that can be used to attack a system and find mitigation to those exploits.

In addition, the paper discusses the actual implementation of the hacking phases with the virtual machines use in the process. The virtual machines specification is also listed. it will also provide means and insights on how to protect one system from being compromised.


Keywords


Compromised Systems, Hacking, Penetration Testing, Exploit, Vulnerability.

References