Please use this identifier to cite or link to this item:
http://hdl.handle.net/10609/147838
Title: | Pentesting & Hacking Ético mediante resolución de un Capture The Flag (CTF) |
Author: | Roa Gutiérrez, Gonzalo |
Tutor: | Serra-Ruiz, Jordi ![]() Gonzalez Pérez, Pablo |
Keywords: | pentesting cybersecurity capture the flag |
Issue Date: | Jun-2022 |
Publisher: | Universitat Oberta de Catalunya (UOC) |
Abstract: | This paper presents the process of analysis of different computer systems with the aim of finding the security problems in them. For this reason, four virtual systems have been prepared with the purpose of obtaining the hidden information they hold. This will be done by searching for the security flaws they contain and exploiting them. Tools and methods for system analysis and vulnerability identification and exploitation will be presented. Also, measures to mitigate the weaknesses found in the systems will be proposed so that an attacker cannot make use of them. The idea for the project arose in response to the increase in cyber-attacks to government organizations and companies in recent years. One of the most important measures to prevent this type of threat is to analyze computer systems to detect and solve security problems before they are found by a malicious actor. Due to this need, it is necessary to study and understand the process of detecting vulnerabilities in systems, since in many occasions automatic tools are not enough to find them. This is why they must be known in depth so that a manual security analysis and vulnerability exploitation can be done when necessary. |
Language: | |
URI: | http://hdl.handle.net/10609/147838 |
Appears in Collections: | Trabajos finales de carrera, trabajos de investigación, etc. |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
groaguTFM0622memoria.pdf | Memoria del TFM | 2,88 MB | Adobe PDF | ![]() View/Open |
Share:


This item is licensed under aCreative Commons License