The uniform procedures of penetration test and protection strategies

碩士 === 開南大學 === 資訊學院碩士班 === 106 === Nowadays, Internet is especially important. While we are in information society, hackers are prevalent threats that may cause massive damage/loss. Although not all hackers are malicious, some of them have done offensive attacks. For example, ATM was stolen more th...

Full description

Bibliographic Details
Main Authors: HUANG, ZHI-KAI, 黃志凱
Other Authors: HSU, JUNG-LUNG
Format: Others
Language:zh-TW
Published: 2018
Online Access:http://ndltd.ncl.edu.tw/handle/g56bck
Description
Summary:碩士 === 開南大學 === 資訊學院碩士班 === 106 === Nowadays, Internet is especially important. While we are in information society, hackers are prevalent threats that may cause massive damage/loss. Although not all hackers are malicious, some of them have done offensive attacks. For example, ATM was stolen more than NT $ 80 million by hackers, resulting in the loss of money in Taiwan’s First Bank in July 2016 year. IT managers led to everchanging pattern difficult to prepare, but also allow more victims leakage of personal information, we need to think of a solution to the so-called "Know thyself, know yourself", first clearly know each other means, in order to come up with corresponding manner. Hacking attacks are divided into five steps: Reconnaissance, Scanning, Gaining Access, Maintaining Access, and Covering tracks. The research mainly uses Kali Linux system to implement five major steps of the hacker program. This study would help IT managers, engineers understand hacking procedures, and thus help them propose corresponding methods of protection. In Kali Linux system itself has more than six hundred kinds of penetration tools, hackers program in accordance with the classification of the five steps to achieve tool, users will not have to reduce from six hundred kinds of penetration tool to screen to be used.