Cloud-SCADA Penetrate: Practical Implementation for Hacking Cloud Computing and Critical SCADA Systems

Loading...
Thumbnail Image
Issue Date
2020
Authors
Kholidy, Hisham A.
Publisher
SUNY Polytechnic Institute
Keywords
cybersecurity , computer hacking , DDoS attack , cloud computing
Abstract
In this report, we discuss some of our hacking and security solutions that we developed at our Advanced Cybersecurity Research Lab (ACRL). This report consists of the following five main experimental packages: 1) Exploiting the cloud computing system using a DDoS attack and developing a distributed deployment of a cloud based Intrusion Detection System (IDS) solution. 2) Hacking SCADA systems components. 3) Hacking Metasploitable machines. 4) Hacking Windows 7 system. 5) Windows Post Exploitation
Description
DOI