Home // ICSNC 2015, The Tenth International Conference on Systems and Networks Communications // View article
Conducting and Identifying Penetration Attacks Using Linux Based Systems
Authors:
Aparicio Carranza
German Calle
Gin Pena
Jose Camacho
Harrison Carranza
Yeraldina Estrella
Keywords: Kali Linux, CAINE, Pentesting, Computer Forensics, Metasploit
Abstract:
Nowadays, it will be hard to say that something like digital security actually exists. It is becoming more common to hear news about businesses being hacked, sensitive information such as credit card information being stolen, and attacks done by Denial of Service (DoS). Penetration testing, also known as Pentesting, involves breaking into systems to find vulnerabilities for the purposes of reinforcing the system’s security. However, in the case that the system has been invaded, closer observation of the attack might be done by using computer forensics tools that attempts to track the damage on the compromised system. Penetration testing can be done by using Metasploit, an integral tool found in Kali Linux. Meanwhile, Computer Forensics can be done by using Autopsy and Guymager, these tools are integrated in Computer Aided Investigative Environment (CAINE). With the combination of the two components, system security and recovery gets improved. This research paper will focus on utilizing these tools to penetrate the system followed by a close examination of the system’s damage.
Pages: 27 to 34
Copyright: Copyright (c) IARIA, 2015
Publication date: November 15, 2015
Published in: conference
ISSN: 2163-9027
ISBN: 978-1-61208-439-8
Location: Barcelona, Spain
Dates: from November 15, 2015 to November 20, 2015