At present, any computer equipment connected to the Internet is exposed to various threats, and the risk to which the servers are exposed when providing services in the cloud is no stranger. One way to prevent it is to act early, detecting the potential vulnerabilities that can be exploited by the attackers. In this way the probability of success of the attacks made is reduced. This article shows techniques for the detection of vulnerabilities with the use of exploit on Linux servers, making use of ethical hacking practices; since the use of these servers is in great demand by software developers and architects, whether it is because of the open source license it has, the ease of use and implementation of different services in these s...
The Internet of Things has allowed the connection of a countless number of devices, which has facili...
Virtunoid is a proof of concept exploit abusing a vulnerability in the open source hardware virtuali...
The objective of this project is to describe and test the most important hacking tools available in ...
Esta tesis se centra en el análisis de dos aspectos complementarios de la ciberdelincuencia (es deci...
Tutor : Xavier Salleras SolerA programming bug in an Operating System can bring down an entire serve...
se propone una metodologia pra el analaisi de vulnerabilidades utilizando software gratuito
El presente artículo tiene como propósito describir por medio de la implementación de un proceso de ...
Worldwide IT industry is experiencing a rapid shift towards Service Oriented Architecture (SOA). As ...
Technology has been evolving over the years, nowadays both public and private companies take the ris...
As the time goes on, software doesn’t stop growing more and more, and the consequence is that securi...
RESUMEN: En el mundo actual se almacena gran cantidad de información en la nube. Mucha de ella es co...
La investigación se enfoca en la evaluación de ataques de denegación de servicios tipo SYN Flood y a...
The Internet of Things has allowed the connection of a countless number of devices, which has facili...
Almost no software is exempt of vulnerabilities. Penetration testing or ethicalhacking can be used t...
We live in a world where information is the most valuable asset that businesses and people can have....
The Internet of Things has allowed the connection of a countless number of devices, which has facili...
Virtunoid is a proof of concept exploit abusing a vulnerability in the open source hardware virtuali...
The objective of this project is to describe and test the most important hacking tools available in ...
Esta tesis se centra en el análisis de dos aspectos complementarios de la ciberdelincuencia (es deci...
Tutor : Xavier Salleras SolerA programming bug in an Operating System can bring down an entire serve...
se propone una metodologia pra el analaisi de vulnerabilidades utilizando software gratuito
El presente artículo tiene como propósito describir por medio de la implementación de un proceso de ...
Worldwide IT industry is experiencing a rapid shift towards Service Oriented Architecture (SOA). As ...
Technology has been evolving over the years, nowadays both public and private companies take the ris...
As the time goes on, software doesn’t stop growing more and more, and the consequence is that securi...
RESUMEN: En el mundo actual se almacena gran cantidad de información en la nube. Mucha de ella es co...
La investigación se enfoca en la evaluación de ataques de denegación de servicios tipo SYN Flood y a...
The Internet of Things has allowed the connection of a countless number of devices, which has facili...
Almost no software is exempt of vulnerabilities. Penetration testing or ethicalhacking can be used t...
We live in a world where information is the most valuable asset that businesses and people can have....
The Internet of Things has allowed the connection of a countless number of devices, which has facili...
Virtunoid is a proof of concept exploit abusing a vulnerability in the open source hardware virtuali...
The objective of this project is to describe and test the most important hacking tools available in ...