Operating Systems of Choice for Professional Hackers
Salvato in:
| Pubblicato in: | International Conference on Cyber Warfare and Security (2018), p. 159 |
|---|---|
| Autore principale: | |
| Altri autori: | |
| Pubblicazione: |
Academic Conferences International Limited
|
| Soggetti: | |
| Accesso online: | Citation/Abstract Full Text Full Text - PDF |
| Tags: |
Nessun Tag, puoi essere il primo ad aggiungerne!!
|
MARC
| LEADER | 00000nab a2200000uu 4500 | ||
|---|---|---|---|
| 001 | 2018926269 | ||
| 003 | UK-CbPIL | ||
| 035 | |a 2018926269 | ||
| 045 | 2 | |b d20180101 |b d20181231 | |
| 084 | |a 142229 |2 nlm | ||
| 100 | 1 | |a Delasko, Sarah | |
| 245 | 1 | |a Operating Systems of Choice for Professional Hackers | |
| 260 | |b Academic Conferences International Limited |c 2018 | ||
| 513 | |a Conference Proceedings | ||
| 520 | 3 | |a Real "black hat" hackers use their skills to provide malicious attacks against government, institutions and other organizations for either financial benefits, methods of protest or publicity. Although it is true that most hackers prefer Linux operating systems, many advanced attacks occur in Microsoft Windows in plain sight. Linux is an easy target for hackers because it is an open-source system. This means that millions of lines of code can viewed publicly and can easily be modified. The system is very flexible, and the hacker can easily check for vulnerabilities through penetration testing, while also having the capabilities to hide their tracks. Windows is a required, but dreaded target for most hackers because it requires them to work in Windows-only environments. It is much more restrictive than Linux, yet is still vulnerable because most exploits are directed at targets running on Windows operating systems. These types of attacks can only be approached in a Windows based environment. This research paper will compare different operating systems used to hack, with a focus of Linux and Windows. It will explain the methodology behind why Hackers choose Linux, as their system of choice to and include key preferences such as source code and interface types. This paper will also cover some of the most popular operating systems besides Linux and Windows for 2017, including: Parrot Security OS, Samurai, Pentoo and Bugtraq. | |
| 610 | 4 | |a Microsoft Corp | |
| 653 | |a Operating systems | ||
| 653 | |a Window systems | ||
| 653 | |a Network security | ||
| 653 | |a Scientific papers | ||
| 653 | |a Windows (computer programs) | ||
| 653 | |a Linux | ||
| 653 | |a Hackers | ||
| 653 | |a Demonstrations & protests | ||
| 653 | |a Cybercrime | ||
| 653 | |a Cybersecurity | ||
| 653 | |a Publicity | ||
| 653 | |a Public finance | ||
| 653 | |a Preferences | ||
| 653 | |a Work skills | ||
| 653 | |a Penetration | ||
| 653 | |a Hacking | ||
| 653 | |a Financial institutions | ||
| 653 | |a Windows | ||
| 653 | |a Systems | ||
| 653 | |a Samurai | ||
| 700 | 1 | |a Chen, Weifeng | |
| 773 | 0 | |t International Conference on Cyber Warfare and Security |g (2018), p. 159 | |
| 786 | 0 | |d ProQuest |t Political Science Database | |
| 856 | 4 | 1 | |3 Citation/Abstract |u https://www.proquest.com/docview/2018926269/abstract/embedded/H09TXR3UUZB2ISDL?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text |u https://www.proquest.com/docview/2018926269/fulltext/embedded/H09TXR3UUZB2ISDL?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text - PDF |u https://www.proquest.com/docview/2018926269/fulltextPDF/embedded/H09TXR3UUZB2ISDL?source=fedsrch |