Threat and vulnerability penetration testing: Linux

A systematic approach to penetration testing of Redhat Linux operating system is described. Hacking is not an easy task, it requires high effort and perseverance to get access, the ability to gather information, skill of coding, and internet working capability is a must. To prevent from intruders, p...

Full description

Bibliographic Details
Main Authors: Setiawan, Deris, Abdullah, Abdul Hanan, Idris, Mohd. Yazid
Format: Article
Published: Taiwan Academic Network Management Committee 2014
Subjects:
_version_ 1796861393653202944
author Setiawan, Deris
Abdullah, Abdul Hanan
Idris, Mohd. Yazid
author_facet Setiawan, Deris
Abdullah, Abdul Hanan
Idris, Mohd. Yazid
author_sort Setiawan, Deris
collection ePrints
description A systematic approach to penetration testing of Redhat Linux operating system is described. Hacking is not an easy task, it requires high effort and perseverance to get access, the ability to gather information, skill of coding, and internet working capability is a must. To prevent from intruders, penetration testing is a comprehensive effort to attempt breaking into a system. In this work the evaluation of performance system is built on Linux operating systems. It can be seen that penetration tests are a useful measurement to check the sanity of network infrastructure and hackable or not.
first_indexed 2024-03-05T19:55:38Z
format Article
id utm.eprints-63079
institution Universiti Teknologi Malaysia - ePrints
last_indexed 2024-03-05T19:55:38Z
publishDate 2014
publisher Taiwan Academic Network Management Committee
record_format dspace
spelling utm.eprints-630792017-06-14T03:07:40Z http://eprints.utm.my/63079/ Threat and vulnerability penetration testing: Linux Setiawan, Deris Abdullah, Abdul Hanan Idris, Mohd. Yazid QA75 Electronic computers. Computer science A systematic approach to penetration testing of Redhat Linux operating system is described. Hacking is not an easy task, it requires high effort and perseverance to get access, the ability to gather information, skill of coding, and internet working capability is a must. To prevent from intruders, penetration testing is a comprehensive effort to attempt breaking into a system. In this work the evaluation of performance system is built on Linux operating systems. It can be seen that penetration tests are a useful measurement to check the sanity of network infrastructure and hackable or not. Taiwan Academic Network Management Committee 2014 Article PeerReviewed Setiawan, Deris and Abdullah, Abdul Hanan and Idris, Mohd. Yazid (2014) Threat and vulnerability penetration testing: Linux. Journal of Internet Technology, 15 (3). pp. 333-342. ISSN 1607-9264 http://dx.doi.org/10.6138/JIT.2014.15.3.02 DOI:10.6138/JIT.2014.15.3.02
spellingShingle QA75 Electronic computers. Computer science
Setiawan, Deris
Abdullah, Abdul Hanan
Idris, Mohd. Yazid
Threat and vulnerability penetration testing: Linux
title Threat and vulnerability penetration testing: Linux
title_full Threat and vulnerability penetration testing: Linux
title_fullStr Threat and vulnerability penetration testing: Linux
title_full_unstemmed Threat and vulnerability penetration testing: Linux
title_short Threat and vulnerability penetration testing: Linux
title_sort threat and vulnerability penetration testing linux
topic QA75 Electronic computers. Computer science
work_keys_str_mv AT setiawanderis threatandvulnerabilitypenetrationtestinglinux
AT abdullahabdulhanan threatandvulnerabilitypenetrationtestinglinux
AT idrismohdyazid threatandvulnerabilitypenetrationtestinglinux