logo

Ethical Hacking and Defence: Flags, Web Shells, and System Security

Write a report on infiltrating a system and attaining root level privileges, finding flags and credentials.

14 Pages3249 Words79 Views
   

Added on  2023-06-04

About This Document

This report delves into the world of ethical hacking and defence, exploring the concepts of flags, web shells, and system security. It discusses the importance of ethical hacking in combating cyber attacks and the methodologies and testing involved in the process. The report also covers TCP port scanning and password cracking techniques. Course code, course name, and college/university not mentioned.

Ethical Hacking and Defence: Flags, Web Shells, and System Security

Write a report on infiltrating a system and attaining root level privileges, finding flags and credentials.

   Added on 2023-06-04

ShareRelated Documents
Ethical Hacking
and Defence
Ethical Hacking and Defence: Flags, Web Shells, and System Security_1
EXECUTIVE SUMMARY
Ethical Hacking is also referred with a term, White Hat Hacking which is practiced by the
certified ethical hacking firm or an individual for identifying the possible threats or
vulnerabilities for system security, which is exploited by the illegal hackers or also referred as
the Black Hat Hackers. Today the organizations and the government firms require ethical
hackers, for combating with the increasing IT security threats. Thus it has lead these
organizations to hire the “ethical hackers”, for exploring their company’s system and identify the
potential weaknesses. The White Hat Hackers help to know how the Black Hat Hackers damage
the system and suggests protective measures from such harms. Further, this report corresponds
with the flags, web shells and system security.
Ethical Hacking and Defence: Flags, Web Shells, and System Security_2
Table of Contents
1. INTRODUCTION.............................................................................................................................1
2. METHODOLOGY AND TESTING................................................................................................1
Flag 1-WEB SERVER...........................................................................................................................3
Flag 2- WEB SHELLS..........................................................................................................................3
Flag 3- PASSWORD CRACKER.........................................................................................................4
Flag 4- TCP PORT SCANNER–Nmap................................................................................................6
Flag 5- PRIVILEGES............................................................................................................................9
3. CONCLUSION..................................................................................................................................9
REFERENCES........................................................................................................................................10
Ethical Hacking and Defence: Flags, Web Shells, and System Security_3
1. INTRODUCTION
Today, the organizations face constant Cyber-Attacks ("Why Businesses Need Ethical
Hackers?", 2018). This enforces the need to secure the organizations from harmful attacks and
the ethical hackers have the capacity to secure the computer and the network of the
organizations.
Hence, ethical hacking comes into picture, which is also referred with a term, White Hat Hacking
and it is practiced by the certified ethical hacking firm or an individual for identifying the
possible threats or vulnerabilities for system security, which is exploited by the illegal hackers or
also referred as the Black Hat Hackers (Gupta, 2018). The ethical hackers try their best for
determining, how the hacker will attack your network. On the other hand, they are trying their
best to figure out a way to secure your system and check whether the system is protected
effectively or not. They perform all the tests with the permission of the organizations (Hanks,
2017).
The objective of this report is to study the flags, web shells, various privileges and system
security.
2. METHODOLOGY AND TESTING
The ethical hacking is conducted which contains manual processes, such as installing the
virtual machine and so on. However, it also contains various tools for testing and for automating
several tasks. But, the general methodologies and understanding takes places behind the process
of the web server’s virtual machine.
1
Ethical Hacking and Defence: Flags, Web Shells, and System Security_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Ethical Hacking: Case Study on Infiltration and Root Level Privileges
|18
|2573
|133

Ethical Hacking and Defence - TCP Port Scanning with Nmap
|14
|3439
|108

Ethical Hacking and Defence: A Case Study
|19
|1954
|321

Ethical Hacking: Methodology, Testing Log, and Outcomes
|23
|3194
|165

Ethical Hacking: Case Study on Virtual Machine with Flags and Techniques
|21
|2782
|194

Ethical Hacking: Case Study on Virtual Machine with Flags, Web Server, Web Shells, Password Cracker, TCP Port Scanner and Privilege Escalation
|21
|2782
|157