Please use this identifier to cite or link to this item:
Title: Clasificación, estudio y comparativa de exploits
Author: Molina Cruz, Pablo
Isern-Deya, Andreu Pere  
Miguel Moneo, Jorge  
Abstract: The proposed Final Degree’s Project starts from a theoretical framework indicating what is and what is not a pentesting in such way that this starting point allows to know the pentesting objectives and its phases. Hence, the interested person will realize that one of the most important phase of a pentesting is the system’s explotation. The aforementioned will give rise to develop a second theoretical part to explain the characteristics and objectives of the different types of exploits. Thus, the interested person will be introduced to the really exposed subject here, "Classification, study and comparison of the different exploits used in security audits". To avoid boredom and monotony, in a practical way, the use of the different types of exploits that can be used when carrying out a security audit will be indicated. The obtained results will serve to begin the fourth part of the Final Degree’s Project that will focus on the comparison between the different types of exploits. The reached results and conclusions indicates that an exploit can be understood as a technique used to take advantage of a vulnerability in a system or application in order to gain unauthorized access or perform some type of malicious action. As such, it could be said that the different existing types of exploits serves the different types of vulnerabilities present on an element in question.
Keywords: exploits
Type: info:eu-repo/semantics/bachelorThesis
Issue Date: Jun-2023
Publication license:
Appears in Collections:Trabajos finales de carrera, trabajos de investigación, etc.

Files in This Item:
File Description SizeFormat 
TFG_Pablo_Molina_Cruz_v2.pdfMemoria del TFG9,69 MBAdobe PDFThumbnail
View statistics

This item is licensed under aCreative Commons License Creative Commons