Loading...
Cloud-SCADA Penetrate: Practical Implementation for Hacking Cloud Computing and Critical SCADA Systems
Journal Title
Readers/Advisors
Journal Title
Term and Year
Publication Date
2020
Book Title
Publication Volume
Publication Issue
Publication Begin
Publication End
Number of pages
Files
Research Projects
Organizational Units
Journal Issue
Abstract
In this report, we discuss some of our hacking and security solutions that we developed at our Advanced Cybersecurity Research Lab (ACRL). This report consists of the following five main experimental packages: 1) Exploiting the cloud computing system using a DDoS attack and developing a distributed deployment of a cloud based Intrusion Detection System (IDS) solution. 2) Hacking SCADA systems components. 3) Hacking Metasploitable machines. 4) Hacking Windows 7 system. 5) Windows Post Exploitation.
Citation
Kholidy, H. A. (2020). Cloud-SCADA Penetrate: Practical Implementation for Hacking Cloud Computing and Critical SCADA Systems. Department of Computer and Network Security, College of Engineering, SUNY Polytechnic Institute.
