Análisis y simulación de ataque de Malware con el uso de la Herramienta Cobalt Strike para la Empresa Pc Soluciones.

The purpose of this case study is to simulate a computer attack through the use of the Cobalt Strike tool on the Kali Linux testing system and, establish the procedures that can be implemented to detect that the systems continue to be attacked and thus prevent this from happening. i.e., to maintain...

Disgrifiad llawn

Wedi'i Gadw mewn:
Manylion Llyfryddiaeth
Prif Awdur: Tamaquiza Murillo, Enzo Aldahir (author)
Fformat: bachelorThesis
Cyhoeddwyd: 2023
Pynciau:
Mynediad Ar-lein:http://dspace.utb.edu.ec/handle/49000/14252
Tagiau: Ychwanegu Tag
Dim Tagiau, Byddwch y cyntaf i dagio'r cofnod hwn!
_version_ 1839386991892889600
author Tamaquiza Murillo, Enzo Aldahir
author_facet Tamaquiza Murillo, Enzo Aldahir
author_role author
collection Repositorio Universidad Técnica de Babahoyo
dc.contributor.none.fl_str_mv Villares Pazmiño, José Danilo
dc.creator.none.fl_str_mv Tamaquiza Murillo, Enzo Aldahir
dc.date.none.fl_str_mv 2023-06-05T15:47:41Z
2023-06-05T15:47:41Z
2023
dc.format.none.fl_str_mv 44 p.
application/pdf
dc.identifier.none.fl_str_mv http://dspace.utb.edu.ec/handle/49000/14252
dc.language.none.fl_str_mv es
dc.publisher.none.fl_str_mv Babahoyo: UTB-FAFI. 2023
dc.rights.none.fl_str_mv Atribución-NoComercial-SinDerivadas 3.0 Ecuador
http://creativecommons.org/licenses/by-nc-nd/3.0/ec/
info:eu-repo/semantics/openAccess
dc.source.none.fl_str_mv reponame:Repositorio Universidad Técnica de Babahoyo
instname:Universidad Técnica de Babahoyo
instacron:UTB
dc.subject.none.fl_str_mv Simulación
Ciberseguridad
Vulnerabilidades
dc.title.none.fl_str_mv Análisis y simulación de ataque de Malware con el uso de la Herramienta Cobalt Strike para la Empresa Pc Soluciones.
dc.type.none.fl_str_mv info:eu-repo/semantics/publishedVersion
info:eu-repo/semantics/bachelorThesis
description The purpose of this case study is to simulate a computer attack through the use of the Cobalt Strike tool on the Kali Linux testing system and, establish the procedures that can be implemented to detect that the systems continue to be attacked and thus prevent this from happening. i.e., to maintain system stability, therefore, tests will be performed to take the appropriate actions that can be performed, thus avoiding possible computer attacks, and counteracting possible and future threats. With this simulation as an example, ways in which the company's information can be protected from home servers to organizational servers will be identified, avoiding, and reducing the high rates of computer crimes. The purpose of this case study is to simulate a computer attack through the use of the Cobalt Strike tool on the Kali Linux testing system and, establish the procedures that can be implemented to detect that the systems continue to be attacked and thus prevent this from happening. i.e., to maintain system stability, therefore, tests will be performed to take the appropriate actions that can be performed, thus avoiding possible computer attacks and counteracting possible and future threats. With this simulation as an example, ways in which the company's information can be protected from home servers to organizational servers will be identified, avoiding and reducing the high rates of computer crimes. In conclusion, it was possible to identify the importance of using Ethical Hacking tools to improve the security of the business network and prevent possible attacks.
eu_rights_str_mv openAccess
format bachelorThesis
id UTB_d1a08f1593bfc4446cda976be0870c1e
instacron_str UTB
institution UTB
instname_str Universidad Técnica de Babahoyo
language_invalid_str_mv es
network_acronym_str UTB
network_name_str Repositorio Universidad Técnica de Babahoyo
oai_identifier_str oai:dspace.utb.edu.ec:49000/14252
publishDate 2023
publisher.none.fl_str_mv Babahoyo: UTB-FAFI. 2023
reponame_str Repositorio Universidad Técnica de Babahoyo
repository.mail.fl_str_mv .
repository.name.fl_str_mv Repositorio Universidad Técnica de Babahoyo - Universidad Técnica de Babahoyo
repository_id_str 0
rights_invalid_str_mv Atribución-NoComercial-SinDerivadas 3.0 Ecuador
http://creativecommons.org/licenses/by-nc-nd/3.0/ec/
spelling Análisis y simulación de ataque de Malware con el uso de la Herramienta Cobalt Strike para la Empresa Pc Soluciones.Tamaquiza Murillo, Enzo AldahirSimulaciónCiberseguridadVulnerabilidadesThe purpose of this case study is to simulate a computer attack through the use of the Cobalt Strike tool on the Kali Linux testing system and, establish the procedures that can be implemented to detect that the systems continue to be attacked and thus prevent this from happening. i.e., to maintain system stability, therefore, tests will be performed to take the appropriate actions that can be performed, thus avoiding possible computer attacks, and counteracting possible and future threats. With this simulation as an example, ways in which the company's information can be protected from home servers to organizational servers will be identified, avoiding, and reducing the high rates of computer crimes. The purpose of this case study is to simulate a computer attack through the use of the Cobalt Strike tool on the Kali Linux testing system and, establish the procedures that can be implemented to detect that the systems continue to be attacked and thus prevent this from happening. i.e., to maintain system stability, therefore, tests will be performed to take the appropriate actions that can be performed, thus avoiding possible computer attacks and counteracting possible and future threats. With this simulation as an example, ways in which the company's information can be protected from home servers to organizational servers will be identified, avoiding and reducing the high rates of computer crimes. In conclusion, it was possible to identify the importance of using Ethical Hacking tools to improve the security of the business network and prevent possible attacks.The purpose of this case study is to simulate a computer attack through the use of the Cobalt Strike tool on the Kali Linux testing system and, establish the procedures that can be implemented to detect that the systems continue to be attacked and thus prevent this from happening. i.e., to maintain system stability, therefore, tests will be performed to take the appropriate actions that can be performed, thus avoiding possible computer attacks, and counteracting possible and future threats. With this simulation as an example, ways in which the company's information can be protected from home servers to organizational servers will be identified, avoiding, and reducing the high rates of computer crimes. The purpose of this case study is to simulate a computer attack through the use of the Cobalt Strike tool on the Kali Linux testing system and, establish the procedures that can be implemented to detect that the systems continue to be attacked and thus prevent this from happening. i.e., to maintain system stability, therefore, tests will be performed to take the appropriate actions that can be performed, thus avoiding possible computer attacks and counteracting possible and future threats. With this simulation as an example, ways in which the company's information can be protected from home servers to organizational servers will be identified, avoiding and reducing the high rates of computer crimes. In conclusion, it was possible to identify the importance of using Ethical Hacking tools to improve the security of the business network and prevent possible attacks.El propósito de este caso de estudio es simular un ataque informático a través de con el uso de la herramienta Cobalt Strike sobre el sistema testeo Kali Linux y, establecer los procedimientos que se pueden implementar para detectar que se continúa atacando a los sistemas y así evitar que esto suceda. es decir, para mantener la estabilidad del sistema, por tanto, se realizarán pruebas para tomar las acciones oportunas que se puedan realizar, evitando así posibles ataques informáticos y contrarrestando posibles y futuras amenazas. Con esta simulación como ejemplo, se identificarán las formas en que la información de la empresa puede protegerse desde los servidores domésticos hasta los servidores organizacionales, evitando y reduciendo las altas tasas de delitos informáticos. El propósito de este caso de estudio es simular un ataque informático a través de con el uso de la herramienta Cobalt Strike sobre el sistema testeo Kali Linux y, establecer los procedimientos que se pueden implementar para detectar que se continúa atacando a los sistemas y así evitar que esto suceda. es decir, para mantener la estabilidad del sistema, por tanto, se realizarán pruebas para tomar las acciones oportunas que se puedan realizar, evitando así posibles ataques informáticos y contrarrestando posibles y futuras amenazas. Con esta simulación como ejemplo, se identificarán las formas en que la información de la empresa puede protegerse desde los servidores domésticos hasta los servidores organizacionales, evitando y reduciendo las altas tasas de delitos informáticos. En conclusión, se pudo identificar la importancia de utilizar herramientas de Hacking Ético para mejorar la seguridad de la red empresarial y prevenir posibles ataques.Babahoyo: UTB-FAFI. 2023Villares Pazmiño, José Danilo2023-06-05T15:47:41Z2023-06-05T15:47:41Z2023info:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/bachelorThesis44 p.application/pdfhttp://dspace.utb.edu.ec/handle/49000/14252esAtribución-NoComercial-SinDerivadas 3.0 Ecuadorhttp://creativecommons.org/licenses/by-nc-nd/3.0/ec/info:eu-repo/semantics/openAccessreponame:Repositorio Universidad Técnica de Babahoyoinstname:Universidad Técnica de Babahoyoinstacron:UTB2023-06-06T08:01:23Zoai:dspace.utb.edu.ec:49000/14252Institucionalhttp://dspace.utb.edu.ec/Universidad públicahttps://utb.edu.ec/http://dspace.utb.edu.ec/oai.Ecuador...opendoar:02023-06-06T08:01:23Repositorio Universidad Técnica de Babahoyo - Universidad Técnica de Babahoyofalse
spellingShingle Análisis y simulación de ataque de Malware con el uso de la Herramienta Cobalt Strike para la Empresa Pc Soluciones.
Tamaquiza Murillo, Enzo Aldahir
Simulación
Ciberseguridad
Vulnerabilidades
status_str publishedVersion
title Análisis y simulación de ataque de Malware con el uso de la Herramienta Cobalt Strike para la Empresa Pc Soluciones.
title_full Análisis y simulación de ataque de Malware con el uso de la Herramienta Cobalt Strike para la Empresa Pc Soluciones.
title_fullStr Análisis y simulación de ataque de Malware con el uso de la Herramienta Cobalt Strike para la Empresa Pc Soluciones.
title_full_unstemmed Análisis y simulación de ataque de Malware con el uso de la Herramienta Cobalt Strike para la Empresa Pc Soluciones.
title_short Análisis y simulación de ataque de Malware con el uso de la Herramienta Cobalt Strike para la Empresa Pc Soluciones.
title_sort Análisis y simulación de ataque de Malware con el uso de la Herramienta Cobalt Strike para la Empresa Pc Soluciones.
topic Simulación
Ciberseguridad
Vulnerabilidades
url http://dspace.utb.edu.ec/handle/49000/14252