Please use this identifier to cite or link to this item:
Title: Pentesting & Hacking Ético mediante resolución de un Capture The Flag (CTF)
Author: Roa Gutiérrez, Gonzalo
Tutor: Serra-Ruiz, Jordi  
González Pérez, Pablo
Abstract: This paper presents the process of analysis of different computer systems with the aim of finding the security problems in them. For this reason, four virtual systems have been prepared with the purpose of obtaining the hidden information they hold. This will be done by searching for the security flaws they contain and exploiting them. Tools and methods for system analysis and vulnerability identification and exploitation will be presented. Also, measures to mitigate the weaknesses found in the systems will be proposed so that an attacker cannot make use of them. The idea for the project arose in response to the increase in cyber-attacks to government organizations and companies in recent years. One of the most important measures to prevent this type of threat is to analyze computer systems to detect and solve security problems before they are found by a malicious actor. Due to this need, it is necessary to study and understand the process of detecting vulnerabilities in systems, since in many occasions automatic tools are not enough to find them. This is why they must be known in depth so that a manual security analysis and vulnerability exploitation can be done when necessary.
Keywords: pentesting
capture the flag
Document type: info:eu-repo/semantics/masterThesis
Issue Date: Jun-2022
Publication license:  
Appears in Collections:Trabajos finales de carrera, trabajos de investigación, etc.

Files in This Item:
File Description SizeFormat 
groaguTFM0622memoria.pdfMemoria del TFM2,88 MBAdobe PDFThumbnail
View statistics

This item is licensed under aCreative Commons License Creative Commons