Cloud-SCADA Penetrate: Practical Implementation for Hacking Cloud Computing and Critical SCADA Systems
Average rating
Cast your vote
You can rate an item by clicking the amount of stars they wish to award to this item.
When enough users have cast their vote on this item, the average rating will also be shown.
Star rating
Your vote was cast
Thank you for your feedback
Thank you for your feedback
Author
Kholidy, Hisham A.Date Published
2020
Metadata
Show full item recordAbstract
In this report, we discuss some of our hacking and security solutions that we developed at our Advanced Cybersecurity Research Lab (ACRL). This report consists of the following five main experimental packages: 1) Exploiting the cloud computing system using a DDoS attack and developing a distributed deployment of a cloud based Intrusion Detection System (IDS) solution. 2) Hacking SCADA systems components. 3) Hacking Metasploitable machines. 4) Hacking Windows 7 system. 5) Windows Post Exploitation.Citation
Kholidy, H. A. (2020). Cloud-SCADA Penetrate: Practical Implementation for Hacking Cloud Computing and Critical SCADA Systems. Department of Computer and Network Security, College of Engineering, SUNY Polytechnic Institute.