{"title":"进攻性安全:渗透测试攻击、方法和类型研究","authors":"Altynai Aibekova, Vinesha Selvarajah","doi":"10.1109/icdcece53908.2022.9792772","DOIUrl":null,"url":null,"abstract":"In the era of increasing growth of digitalization all information has become easily available through mobile and computer devices. This improvement has brought many useful and efficient technologies and services to peoples’ lives which are Web Application, Cloud Computing, Online Communication platforms, E-Commerce, and far more. While some users access this information with only good intentions, some use it to identify ways to destroy or steal valuable data, documents of a website, or in a physical building. As it is well known the term penetration testing is also named ethical hacking. Penetration testing is a set of procedures that emulates the actions of potential hackers but instead of taking advantage of the breaches found, penetration testers document them and present practical advice on how to fix identified weaknesses in the system. This study aims to discuss the types, the strategies of penetration testing, the code of conduct of penetration testers, the advantages, and the methodology in performing penetration testing. The method of penetration testing includes six stages that will be further discussed in detail. This paper illustrates a practical exercise in the example of the Five86-1 machine in a CTF format and that is built with the purpose of learning and gaining experience in conducting ethical hacking. All the attacks demonstrated in the paper are done in Kali Linux operating system. Further, the impact and critical analysis of the attacks is covered in the paper.","PeriodicalId":417643,"journal":{"name":"2022 IEEE International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Offensive Security: Study on Penetration Testing Attacks, Methods, and their Types\",\"authors\":\"Altynai Aibekova, Vinesha Selvarajah\",\"doi\":\"10.1109/icdcece53908.2022.9792772\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the era of increasing growth of digitalization all information has become easily available through mobile and computer devices. This improvement has brought many useful and efficient technologies and services to peoples’ lives which are Web Application, Cloud Computing, Online Communication platforms, E-Commerce, and far more. While some users access this information with only good intentions, some use it to identify ways to destroy or steal valuable data, documents of a website, or in a physical building. As it is well known the term penetration testing is also named ethical hacking. Penetration testing is a set of procedures that emulates the actions of potential hackers but instead of taking advantage of the breaches found, penetration testers document them and present practical advice on how to fix identified weaknesses in the system. This study aims to discuss the types, the strategies of penetration testing, the code of conduct of penetration testers, the advantages, and the methodology in performing penetration testing. The method of penetration testing includes six stages that will be further discussed in detail. This paper illustrates a practical exercise in the example of the Five86-1 machine in a CTF format and that is built with the purpose of learning and gaining experience in conducting ethical hacking. All the attacks demonstrated in the paper are done in Kali Linux operating system. Further, the impact and critical analysis of the attacks is covered in the paper.\",\"PeriodicalId\":417643,\"journal\":{\"name\":\"2022 IEEE International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE)\",\"volume\":\"3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-04-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/icdcece53908.2022.9792772\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/icdcece53908.2022.9792772","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Offensive Security: Study on Penetration Testing Attacks, Methods, and their Types
In the era of increasing growth of digitalization all information has become easily available through mobile and computer devices. This improvement has brought many useful and efficient technologies and services to peoples’ lives which are Web Application, Cloud Computing, Online Communication platforms, E-Commerce, and far more. While some users access this information with only good intentions, some use it to identify ways to destroy or steal valuable data, documents of a website, or in a physical building. As it is well known the term penetration testing is also named ethical hacking. Penetration testing is a set of procedures that emulates the actions of potential hackers but instead of taking advantage of the breaches found, penetration testers document them and present practical advice on how to fix identified weaknesses in the system. This study aims to discuss the types, the strategies of penetration testing, the code of conduct of penetration testers, the advantages, and the methodology in performing penetration testing. The method of penetration testing includes six stages that will be further discussed in detail. This paper illustrates a practical exercise in the example of the Five86-1 machine in a CTF format and that is built with the purpose of learning and gaining experience in conducting ethical hacking. All the attacks demonstrated in the paper are done in Kali Linux operating system. Further, the impact and critical analysis of the attacks is covered in the paper.