Skip to main content

Vulnerability Analysis Through Ethical Hacking Techniques

  • Conference paper
  • First Online:
Advances in Human Factors in Robots, Unmanned Systems and Cybersecurity (AHFE 2021)

Abstract

This article explains the analysis of vulnerabilities with the ethical hacking modalities classified as External Hacking and Internal Hacking used in the information-gathering phase. This study was carried out in the network of the Decentralized Municipal Government of the Olmedo – Manabí County and different techniques of each modality were used to obtain information from this institution. The results obtained, such as the level of severity, what are the most common types of vulnerabilities, or to which categories they belong, are very important information for executing the next phases of ethical hacking and determining the real level of risk of the vulnerabilities present.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Karina, A.: Hacking ético 101. Babelcube Inc. (2017)

    Google Scholar 

  2. Parrales, W.M.A., et al.: La ciberseguridad práctica aplicada a las redes, servidores y navegadores web. 3Ciencias (2019). https://www.researchgate.net/publication/337853806_La_ciberseguridad_practica_aplicada_a_las_redes_servidores_y_navegadores_web

  3. Brijesh, K.P., Alok, S., Lovely, B.: Ethical Hacking (Tools, Techniques and Approaches) (2015). Disponible en. https://www.researchgate.net/publication/271079090_ETHICAL_HACKING_Tools_Techniques_and_Approaches

  4. Patil, S., Jangra, A., Bhale, M., Raina, A., Kulkarni, P.: Ethical hacking: the need for cyber security. In: 2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI), pp. 1602–1606. IEEE (2017)

    Google Scholar 

  5. Wang, Y., Yang, J.: Ethical hacking and network defense: choose your best network vulnerability scanning tool. In: 2017 31st International Conference on Advanced Information Networking and Applications Workshops, pp. 110–113. IEEE. WAINA (2017)

    Google Scholar 

  6. Santos, Y.: Introducción a las pruebas de penetración, Research Gate (2015). https://www.researchgate.net/publication/313839026_Introduccion_a_las_pruebas_de_penetracion

  7. Muñoz, P., Camilo, C.: Análisis de metodologías de Ethical hacking para la detección de vulnerabilidades en las Pymes (2019). http://repository.unad.edu.co/handle/10596/30302

  8. Gudiño, L., Wladimir, M.: Auditoría de seguridad informática en la red interna de la Universidad Técnica del Norte según la metodología Offensive Security Professional Training and Tools For Security Specialists y planteamiento de políticas de seguridad basadas en la norma ISO/IEC 27001 (2017). http://repositorio.utn.edu.ec/handle/123456789/6975

  9. Gartner Information Technology Research. https://www.gartner.com/en/documents/3979309

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ángel Rolando Delgado-Pilozo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Delgado-Pilozo, Á.R., Demera-Centeno, V.B., Zambrano-Solorzano, E.T. (2021). Vulnerability Analysis Through Ethical Hacking Techniques. In: Zallio, M., Raymundo Ibañez, C., Hernandez, J.H. (eds) Advances in Human Factors in Robots, Unmanned Systems and Cybersecurity. AHFE 2021. Lecture Notes in Networks and Systems, vol 268. Springer, Cham. https://doi.org/10.1007/978-3-030-79997-7_32

Download citation

Publish with us

Policies and ethics