Show simple item record

dc.contributor.authorKholidy, Hisham A.
dc.date.accessioned2020-12-21T20:45:14Z
dc.date.available2020-12-21T20:45:14Z
dc.date.issued2020
dc.identifier.citationKholidy, H. A. (2020). Cloud-SCADA Penetrate: Practical Implementation for Hacking Cloud Computing and Critical SCADA Systems. College of Engineering, SUNY Polytechnic Institute.en_US
dc.identifier.urihttp://hdl.handle.net/1951/71331
dc.description.abstractIn this report, we discuss some of our hacking and security solutions that we developed at our Advanced Cybersecurity Research Lab (ACRL). This report consists of the following five main experimental packages: 1) Exploiting the cloud computing system using a DDoS attack and developing a distributed deployment of a cloud based Intrusion Detection System (IDS) solution. 2) Hacking SCADA systems components. 3) Hacking Metasploitable machines. 4) Hacking Windows 7 system. 5) Windows Post Exploitationen_US
dc.publisherSUNY Polytechnic Instituteen_US
dc.subjectcybersecurityen_US
dc.subjectcomputer hackingen_US
dc.subjectDDoS attacken_US
dc.subjectcloud computingen_US
dc.titleCloud-SCADA Penetrate: Practical Implementation for Hacking Cloud Computing and Critical SCADA Systemsen_US
dc.typeOtheren_US


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record