基于Linux安全漏洞渗透测试方法的研究  被引量:3

Research on testing method of security vulnerability penetration based on Linux

在线阅读下载全文

作  者:金涛 李新剑 刘宏斌 史震宇 Jin Tao;Li Xinjian;Liu Hongbin;Shi Zhenyu(School of Public Security Technology,Gansu Political Science and Law Institute,GansuLanzhou 730070)

机构地区:[1]甘肃政法学院公安技术学院

出  处:《网络空间安全》2019年第3期28-35,共8页Cyberspace Security

摘  要:随着网络技术的高速发展,黑客攻击的手段越来越多,操作系统的安全性也必须随之提升。由于Linux操作系统内部的权限机构比较复杂且周密,所以相比于Windows来说更安全,常被用在服务器平台。但并不是说Linux就是绝对安全的,出于保护系统的目的,需要对系统进行渗透测试,用来找出测试对象的安全隐患,提高系统的安全性。文章分析了Linux系统的两个安全漏洞,并且对Linux系统进行模拟攻击,获取漏洞主机的控制权限,进一步说明了安全漏洞的危害性。With the rapid development of network technology,the means of hacker attack are more and more,and the security of operating system must be improved accordingly.Because of the complexity and sophistication of the privilege mechanism within the Linux operating system,it is safer than Windows and is often used on the server platform.But it does not mean that Linux is absolutely safe.For the purpose of protecting the system,it is necessary to conduct penetration testing of the system to find out the potential security hazards of the test objects and improve the security of the system.This paper analyses two security vulnerabilities of Linux system,and simulates attacks on Linux system to obtain the control rights of vulnerable hosts,which further illustrates the harmfulness of security vulnerabilities.

关 键 词:LINUX 渗透测试 漏洞利用 

分 类 号:TP393[自动化与计算机技术—计算机应用技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象