Abstract
This article explains the analysis of vulnerabilities with the ethical hacking modalities classified as External Hacking and Internal Hacking used in the information-gathering phase. This study was carried out in the network of the Decentralized Municipal Government of the Olmedo – Manabí County and different techniques of each modality were used to obtain information from this institution. The results obtained, such as the level of severity, what are the most common types of vulnerabilities, or to which categories they belong, are very important information for executing the next phases of ethical hacking and determining the real level of risk of the vulnerabilities present.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Karina, A.: Hacking ético 101. Babelcube Inc. (2017)
Parrales, W.M.A., et al.: La ciberseguridad práctica aplicada a las redes, servidores y navegadores web. 3Ciencias (2019). https://www.researchgate.net/publication/337853806_La_ciberseguridad_practica_aplicada_a_las_redes_servidores_y_navegadores_web
Brijesh, K.P., Alok, S., Lovely, B.: Ethical Hacking (Tools, Techniques and Approaches) (2015). Disponible en. https://www.researchgate.net/publication/271079090_ETHICAL_HACKING_Tools_Techniques_and_Approaches
Patil, S., Jangra, A., Bhale, M., Raina, A., Kulkarni, P.: Ethical hacking: the need for cyber security. In: 2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI), pp. 1602–1606. IEEE (2017)
Wang, Y., Yang, J.: Ethical hacking and network defense: choose your best network vulnerability scanning tool. In: 2017 31st International Conference on Advanced Information Networking and Applications Workshops, pp. 110–113. IEEE. WAINA (2017)
Santos, Y.: Introducción a las pruebas de penetración, Research Gate (2015). https://www.researchgate.net/publication/313839026_Introduccion_a_las_pruebas_de_penetracion
Muñoz, P., Camilo, C.: Análisis de metodologías de Ethical hacking para la detección de vulnerabilidades en las Pymes (2019). http://repository.unad.edu.co/handle/10596/30302
Gudiño, L., Wladimir, M.: Auditoría de seguridad informática en la red interna de la Universidad Técnica del Norte según la metodología Offensive Security Professional Training and Tools For Security Specialists y planteamiento de políticas de seguridad basadas en la norma ISO/IEC 27001 (2017). http://repositorio.utn.edu.ec/handle/123456789/6975
Gartner Information Technology Research. https://www.gartner.com/en/documents/3979309
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Delgado-Pilozo, Á.R., Demera-Centeno, V.B., Zambrano-Solorzano, E.T. (2021). Vulnerability Analysis Through Ethical Hacking Techniques. In: Zallio, M., Raymundo Ibañez, C., Hernandez, J.H. (eds) Advances in Human Factors in Robots, Unmanned Systems and Cybersecurity. AHFE 2021. Lecture Notes in Networks and Systems, vol 268. Springer, Cham. https://doi.org/10.1007/978-3-030-79997-7_32
Download citation
DOI: https://doi.org/10.1007/978-3-030-79997-7_32
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-79996-0
Online ISBN: 978-3-030-79997-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)