Threat and vulnerability penetration testing: Linux

A systematic approach to penetration testing of Redhat Linux operating system is described. Hacking is not an easy task, it requires high effort and perseverance to get access, the ability to gather information, skill of coding, and internet working capability is a must. To prevent from intruders, p...

Full description

Saved in:
Bibliographic Details
Main Authors: Setiawan, Deris, Abdullah, Abdul Hanan, Idris, Mohd. Yazid
Format: Article
Published: Taiwan Academic Network Management Committee 2014
Subjects:
Online Access:http://eprints.utm.my/id/eprint/63079/
http://dx.doi.org/10.6138/JIT.2014.15.3.02
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:A systematic approach to penetration testing of Redhat Linux operating system is described. Hacking is not an easy task, it requires high effort and perseverance to get access, the ability to gather information, skill of coding, and internet working capability is a must. To prevent from intruders, penetration testing is a comprehensive effort to attempt breaking into a system. In this work the evaluation of performance system is built on Linux operating systems. It can be seen that penetration tests are a useful measurement to check the sanity of network infrastructure and hackable or not.