2020
DOI: 10.18502/keg.v5i1.5926
|View full text |Cite
|
Sign up to set email alerts
|

Use of exploit for vulnerability detection of Linux Servers

Abstract: At present, any computer equipment connected to the Internet is exposed to various threats, and the risk to which the servers are exposed when providing services in  the cloud is no stranger. One way to prevent it is to act early, detecting the potential vulnerabilities that can be exploited by the attackers. In this way the probability of success of the attacks made is reduced. This article shows techniques for the detection of vulnerabilities with the use of exploit on Linux servers, making use of ethical ha… Show more

Help me understand this report

This publication either has no citations yet, or we are still processing them

Set email alert for when this publication receives citations?

See others like this or search for similar articles