{"title":"用Metasploit和Kali Linux入侵远程系统","authors":"Eduardo de la Cruz Gámez","doi":"10.1109/CIMPS57786.2022.10035712","DOIUrl":null,"url":null,"abstract":"This article describes the basic elements of Ethical Hacking to understand the necessary concepts for the use ofautomated remote intrusion tools, the modules that are necessaryto carry out a successful attack using Metasploit are detailed, the basic remote manipulation commands are also described, once theintrusion is achieved.","PeriodicalId":205829,"journal":{"name":"2022 11th International Conference On Software Process Improvement (CIMPS)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Ethical Hacking to remote systems using Metasploit and Kali Linux\",\"authors\":\"Eduardo de la Cruz Gámez\",\"doi\":\"10.1109/CIMPS57786.2022.10035712\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This article describes the basic elements of Ethical Hacking to understand the necessary concepts for the use ofautomated remote intrusion tools, the modules that are necessaryto carry out a successful attack using Metasploit are detailed, the basic remote manipulation commands are also described, once theintrusion is achieved.\",\"PeriodicalId\":205829,\"journal\":{\"name\":\"2022 11th International Conference On Software Process Improvement (CIMPS)\",\"volume\":\"70 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-10-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 11th International Conference On Software Process Improvement (CIMPS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CIMPS57786.2022.10035712\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 11th International Conference On Software Process Improvement (CIMPS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIMPS57786.2022.10035712","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Ethical Hacking to remote systems using Metasploit and Kali Linux
This article describes the basic elements of Ethical Hacking to understand the necessary concepts for the use ofautomated remote intrusion tools, the modules that are necessaryto carry out a successful attack using Metasploit are detailed, the basic remote manipulation commands are also described, once theintrusion is achieved.