ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

MULTI-LEVEL WINDOWS EXPLOITATION USING LINUX OPERATING SYSTEM

Journal: Asian Journal of Natural and Applied Sciences (Vol.5, No. 2)

Publication Date:

Authors : ;

Page : 59-66

Keywords : Hacking; Black Hat Hacker; Vulnerability; Exploiting;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Hacking is the art of exploiting computers to get access to otherwise unauthorized information. Now days, the world is using many modern IT systems to gather, store, and manipulate important information. Besides that, it is very important to make sure that those stored information are secure. However, there is no system, software, or application made with zero vulnerabilities. Moreover, there are so many easy ways and tools through which a hacker can get into a system.Today, a malicious hacker is usually referred to as a black hat or criminal hacker, which describes any individual who scans the vulnerabilities of systems and illegally breaks into computer systems to damage or steal information.This paper will present advantages of ethical hacking to secure systems, networks, or applications. This work includes four parts. The first part is scanning a network to find out all hosts which are connected to the router. The second part, is selecting a target that we want to scan its vulnerabilities and weak points of the victim machine. The third part is creating a Trojan file, which enables us to exploit the vulnerabilities of the system target. The fourth part, is encoding the Trojan file to make it undetectable by the target's antiviruses. The last part, exploit and login into the target machine.In this paper we have used some tools and techniques that hackers use for exploiting systems. We used Linux OS as a hacker machine, windows Server OS as target machine, and some other hackers' tools.

Last modified: 2017-07-21 19:14:05