Home // ICSNC 2015, The Tenth International Conference on Systems and Networks Communications // View article


Conducting and Identifying Penetration Attacks Using Linux Based Systems

Authors:
Aparicio Carranza
German Calle
Gin Pena
Jose Camacho
Harrison Carranza
Yeraldina Estrella

Keywords: Kali Linux, CAINE, Pentesting, Computer Forensics, Metasploit

Abstract:
Nowadays, it will be hard to say that something like digital security actually exists. It is becoming more common to hear news about businesses being hacked, sensitive information such as credit card information being stolen, and attacks done by Denial of Service (DoS). Penetration testing, also known as Pentesting, involves breaking into systems to find vulnerabilities for the purposes of reinforcing the system’s security. However, in the case that the system has been invaded, closer observation of the attack might be done by using computer forensics tools that attempts to track the damage on the compromised system. Penetration testing can be done by using Metasploit, an integral tool found in Kali Linux. Meanwhile, Computer Forensics can be done by using Autopsy and Guymager, these tools are integrated in Computer Aided Investigative Environment (CAINE). With the combination of the two components, system security and recovery gets improved. This research paper will focus on utilizing these tools to penetrate the system followed by a close examination of the system’s damage.

Pages: 27 to 34

Copyright: Copyright (c) IARIA, 2015

Publication date: November 15, 2015

Published in: conference

ISSN: 2163-9027

ISBN: 978-1-61208-439-8

Location: Barcelona, Spain

Dates: from November 15, 2015 to November 20, 2015