Mostrar el registro sencillo del ítem
Análisis de ataques mediante la inyección de troyanos a un sistema operativo Microsoft Windows utilizando la herramienta Msfvenom en el sistema kali Linux.
dc.contributor.advisor | Peña Herrera, Larenas Milton | |
dc.contributor.author | Pendolema Jaramillo, Fredy Amaro | |
dc.date.accessioned | 2023-11-07T14:25:09Z | |
dc.date.available | 2023-11-07T14:25:09Z | |
dc.date.issued | 2023 | |
dc.identifier.uri | http://dspace.utb.edu.ec/handle/49000/15038 | |
dc.description | The analysis of a cyber attack is undoubtedly a controversial topic, because there are several ways in which various vulnerabilities can be realized, Msfvenom is a tool which is included in Metasploit Framework which is widely used by cybersecurity experts in order to make payloads, ie a code or malicious software that is characterized by being created in order to perform unauthorized actions to a particular system. It should be clarified that most of the Microsoft Windows operating systems are usually the primary targets because this system is often found in homes and in office or business places, the action of making Trojan injections is performed by the tool known as Msfvenom, which is responsible for generating payloads or dangerous scripts, a very regular example are the .exe or executable files or simply various documents that find the opportunity to exploit vulnerabilities or weaknesses in the system. For the process of a Trojan injection attack using the Msfvenom tool, usually follows a very common pattern, first of all hackers or security experts are responsible for finding an opening, weakness or vulnerability in the Windows system which allows the hacker to find the most optimal way to perform the attack, after that, the attacker proceeds to use the Msfvenom tool to use a malicious payload which 'can be a malicious .exe file, a document or misleading URL. | es_ES |
dc.description | The analysis of a cyber attack is undoubtedly a controversial topic, because there are several ways in which various vulnerabilities can be realized, Msfvenom is a tool which is included in Metasploit Framework which is widely used by cybersecurity experts in order to make payloads, ie a code or malicious software that is characterized by being created in order to perform unauthorized actions to a particular system. It should be clarified that most of the Microsoft Windows operating systems are usually the primary targets because this system is often found in homes and in office or business places, the action of making Trojan injections is performed by the tool known as Msfvenom, which is responsible for generating payloads or dangerous scripts, a very regular example are the .exe or executable files or simply various documents that find the opportunity to exploit vulnerabilities or weaknesses in the system. For the process of a Trojan injection attack using the Msfvenom tool, usually follows a very common pattern, first of all hackers or security experts are responsible for finding an opening, weakness or vulnerability in the Windows system which allows the hacker to find the most optimal way to perform the attack, after that, the attacker proceeds to use the Msfvenom tool to use a malicious payload which 'can be a malicious .exe file, a document or misleading URL. | es_ES |
dc.description.abstract | El análisis de un ataque cibernético, sin duda es un tema bastante controversial, debido a que existen diversas maneras las cuales se pueden realizar diversas vulnerabilidades, Msfvenom es una herramienta la cual está incluida en Metasploit Framework la cual es sumamente utilizada por los expertos en ciberseguridad con el objetivo de hacer payloads, es decir un código o software malicioso que se caracteriza por ser creado con el fin de realizar acciones desautorizadas hacia un sistema en concreto. Cabe aclarar que gran parte de los sistemas operativos de Microsoft Windows suelen ser los objetivos primordiales debido a que este sistema se encuentra frecuentemente en hogares como en lugares de oficina o empresariales, la acción de hacer inyecciones de troyanos se la realiza mediante la herramienta conocida como Msfvenom, la cual es la que se encarga de generar payloads o scripts peligrosos, un ejemplo muy regular son los archivos .exe o ejecutables o simplemente diversos documentos que encuentren la oportunidad de aprovechar las vulnerabilidades o debilidades del sistema. Para el proceso de un ataque de inyección de troyanos mediante la herramienta Msfvenom, por lo general sigue un patrón muy común, primero que todo los hackers o expertos en seguridad se encargan de encontrar una apertura, debilidad o vulnerabilidad en el sistema Windows la cual permita al hacker encontrar la vía más optima de realizar el ataque, después de eso, el atacante procede a utilizar la herramienta Msfvenom para poder usar un payload malicioso el cual ´puede ser un archivo .exe malicioso, algún documento o URL engañoso. | es_ES |
dc.format.extent | 38 p. | es_ES |
dc.language.iso | es | es_ES |
dc.publisher | Babahoyo: UTB-FAFI. 2023 | es_ES |
dc.rights | Atribución-NoComercial-SinDerivadas 3.0 Ecuador | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/ec/ | * |
dc.subject | Msfvenom | es_ES |
dc.subject | Metasploit Framework | es_ES |
dc.subject | Ciberseguridad | es_ES |
dc.subject | Payloads | es_ES |
dc.subject | Código | es_ES |
dc.subject | Software | es_ES |
dc.subject | Sistemas Operativos | es_ES |
dc.subject | Microsoft Windows | es_ES |
dc.subject | Scripts | es_ES |
dc.subject | Troyanos | es_ES |
dc.subject | Vulnerabilidad | es_ES |
dc.subject | URL | es_ES |
dc.title | Análisis de ataques mediante la inyección de troyanos a un sistema operativo Microsoft Windows utilizando la herramienta Msfvenom en el sistema kali Linux. | es_ES |
dc.type | bachelorThesis | es_ES |