Análisis y simulación de ataque de Malware con el uso de la Herramienta Cobalt Strike para la Empresa Pc Soluciones.

The purpose of this case study is to simulate a computer attack through the use of the Cobalt Strike tool on the Kali Linux testing system and, establish the procedures that can be implemented to detect that the systems continue to be attacked and thus prevent this from happening. i.e., to maintain...

全面介紹

Saved in:
書目詳細資料
主要作者: Tamaquiza Murillo, Enzo Aldahir (author)
格式: bachelorThesis
出版: 2023
主題:
在線閱讀:http://dspace.utb.edu.ec/handle/49000/14252
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!
實物特徵
總結:The purpose of this case study is to simulate a computer attack through the use of the Cobalt Strike tool on the Kali Linux testing system and, establish the procedures that can be implemented to detect that the systems continue to be attacked and thus prevent this from happening. i.e., to maintain system stability, therefore, tests will be performed to take the appropriate actions that can be performed, thus avoiding possible computer attacks, and counteracting possible and future threats. With this simulation as an example, ways in which the company's information can be protected from home servers to organizational servers will be identified, avoiding, and reducing the high rates of computer crimes. The purpose of this case study is to simulate a computer attack through the use of the Cobalt Strike tool on the Kali Linux testing system and, establish the procedures that can be implemented to detect that the systems continue to be attacked and thus prevent this from happening. i.e., to maintain system stability, therefore, tests will be performed to take the appropriate actions that can be performed, thus avoiding possible computer attacks and counteracting possible and future threats. With this simulation as an example, ways in which the company's information can be protected from home servers to organizational servers will be identified, avoiding and reducing the high rates of computer crimes. In conclusion, it was possible to identify the importance of using Ethical Hacking tools to improve the security of the business network and prevent possible attacks.