Please use this identifier to cite or link to this item:
Title: Pentesting & Hacking Ético mediante resolución de un Capture The Flag (CTF)
Author: Torres Gonzalo, Israel
Tutor: González Pérez, Pablo
Others: Serra-Ruiz, Jordi  
Abstract: The purpose of this paper is to learn about the methodology used to perform a pentesting or penetration test on a computer system. Once this methodology has been successfully applied to a system, we can identify and resolve the incorrect configurations that put this asset at risk in order to protect it against future attacks. This is a relatively new but critical methodology for assets exposed to public networks such as the Internet, as it allows companies to anticipate what an attacker could do to their assets and provide them with the measures to prevent it. This master's thesis begins with a review of the state of the art that has led to the standardised use of CTF (Capture The Flag) challenges as a didactic methodology for pentesting. It continues with a presentation of the environment chosen to perform the three proposed scenarios, both at hardware and software level. Subsequently, the resolution of the three scenarios is conducted in five different phases and with a multitude of additional information such as a description of shell console commands or screenshots with the results obtained in each step. Subsequently, the conclusions drawn from the completion of this master's thesis are reviewed.
Keywords: pentesting
computer security
cyber security
Document type: info:eu-repo/semantics/masterThesis
Issue Date: 10-Jan-2023
Publication license:  
Appears in Collections:Trabajos finales de carrera, trabajos de investigación, etc.

Files in This Item:
File Description SizeFormat 
israeltorresTFM0123memoria.pdfMemoria del TFM4,16 MBAdobe PDFThumbnail
israeltorresTFM0123presentacion.pdfPresentación del TFM2,72 MBAdobe PDFThumbnail
View statistics

This item is licensed under aCreative Commons License Creative Commons