dc.contributor.author | Kholidy, Hisham A. | |
dc.date.accessioned | 2020-12-21T20:45:14Z | |
dc.date.available | 2020-12-21T20:45:14Z | |
dc.date.issued | 2020 | |
dc.identifier.citation | Kholidy, H. A. (2020). Cloud-SCADA Penetrate: Practical Implementation for Hacking Cloud Computing and Critical SCADA Systems. College of Engineering, SUNY Polytechnic Institute. | en_US |
dc.identifier.uri | http://hdl.handle.net/1951/71331 | |
dc.description.abstract | In this report, we discuss some of our hacking and security solutions that we developed at our Advanced Cybersecurity Research Lab (ACRL). This report consists of the following five main experimental packages:
1) Exploiting the cloud computing system using a DDoS attack and developing a distributed deployment of a cloud based Intrusion Detection System (IDS) solution.
2) Hacking SCADA systems components.
3) Hacking Metasploitable machines.
4) Hacking Windows 7 system.
5) Windows Post Exploitation | en_US |
dc.publisher | SUNY Polytechnic Institute | en_US |
dc.subject | cybersecurity | en_US |
dc.subject | computer hacking | en_US |
dc.subject | DDoS attack | en_US |
dc.subject | cloud computing | en_US |
dc.title | Cloud-SCADA Penetrate: Practical Implementation for Hacking Cloud Computing and Critical SCADA Systems | en_US |
dc.type | Other | en_US |