At present, any computer equipment connected to the Internet is exposed to various threats, and the risk to which the servers are exposed when providing services in the cloud is no stranger. One way to prevent it is to act early, detecting the potential vulnerabilities that can be exploited by the attackers. In this way the probability of success of the attacks made is reduced. This article shows techniques for the detection of vulnerabilities with the use of exploit on Linux servers, making use of ethical hacking practices; since the use of these servers is in great demand by software developers and architects, whether it is because of the open source license it has, the ease of use and implementation of different services in these servers, and the security issue. For this, different phases were developed called recognition, port scanning, enumeration of services, vulnerability scanning, obtaining access and maintaining access. They are necessary to carry out each of the phases for their execution. The results obtained with the use of exploits were satisfactory for the detection of vulnerabilities of the different services that work on a linux server; With this information you can reduce the risks to which these servers are exposed, providing different services and working with valuable information. Resumen. En la actualidad cualquier equipo de cómputo conectado a internet está expuesta a diversas amenazas, y no es ajena el riesgo a los que están expuestos los servidores al brindar servicios en la nube. Una manera de prevenirlo es actuar anticipadamente, detectando las vulnerabilidades potenciales que pueden ser aprovechadas por los atacantes. De esta manera se disminuye la probabilidad de éxito de los ataques realizados. El presente artículo muestra técnicas para la detección de vulnerabilidades con el uso de exploit en servidores linux, haciendo uso de las prácticas de hackeo ético; ya que el uso de estos servidores tiene mucha demanda por los desarrolladores y arquitectos de software, sea por la licencia open source que tiene, la facilidad de uso e implementación de distintos servicios en estos servidores, y el tema de seguridad. Para esto se desarrollaron diferentes fases llamadas reconocimiento, escaneo de puertos, enumeración de servicios, escaneo de vulnerabilidades, obtener el acceso y mantener el acceso. Son necesarios realizar cada una de las fases para la ejecución de las mismas. Los resultados obtenidos con el uso de exploits fueron satisfactorios para la detección de vulnerabilidades de los diferentes servicios que funcionan en un servidor linux; con esta información se puede reducir los riesgos a los cuales están expuestos estos servidores que brinda diferentes servicios y trabajan con información valiosa.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.