Show simple item record

Malware, active hacking, passive hacking.

Dublin Core metadata

dc.creatorΚαραντωνάκης, Γεώργιοςel
dc.creatorKarantonakis, Georgiosen
dc.date.accessioned2017-01-17T10:45:13Z
dc.date.available2017-01-17T10:45:13Z
dc.date.issued2017-01-12
dc.identifier.urihttp://hdl.handle.net/20.500.12688/8019
dc.description.abstractΟ σκοπός αυτής της πτυχιακής είναι να αναδείξει κάποιες τεχνικές hacking είτε από κακόβουλο λογισµικό είτε από µια γκάµα εξειδικευµένων εργαλείων για τέτοιες δουλειές όπως το λειτουργικό σύστηµα kali linux.el
dc.description.abstractIn the first chapter we will cover theoretical background. -What are hackers, hacker types and hacking history.-What is hacking, active hacking, passive hacking. -What is malicious software, different malware types.-Malware infects target in the form of Trojan horse thus creating a botnet. -Malicius Trojan horse software infects target through a game and begins to monitor and record what the user types.In the third chapter will follow practical techniques. -Breaking wpa2 personal LANs and after techniques of the man in the middle in other computer systems. -Attacks on PCs with backdoor implantation techniques and access the machine by Metasploit Framework platform. -Sql injection attacks into vunerable websites for extracting information from databases.en
dc.languageΕλληνικάel
dc.languageGreeken
dc.publisherΤ.Ε.Ι. Κρήτης, Τεχνολογικών Εφαρμογών (Σ.Τ.Εφ), Τμήμα Μηχανικών Πληροφορικής Τ.Ε.el
dc.publisherT.E.I. of Crete, School of Engineering (STEF), Department of Informatics Engineeringen
dc.rightsAttribution-NonCommercial-NoDerivs 3.0 United States*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/us/*
dc.titleΚακόβουλο λογισμικό, active hacking, passive hacking.el
dc.titleMalware, active hacking, passive hacking.en

healMeta

heal.creatorNameΚαραντωνάκης, Γεώργιοςel
heal.creatorNameKarantonakis, Georgiosen
heal.publicationDate2017-01-12
heal.identifier.primaryhttp://hdl.handle.net/20.500.12688/8019
heal.abstractΟ σκοπός αυτής της πτυχιακής είναι να αναδείξει κάποιες τεχνικές hacking είτε από κακόβουλο λογισµικό είτε από µια γκάµα εξειδικευµένων εργαλείων για τέτοιες δουλειές όπως το λειτουργικό σύστηµα kali linux.el
heal.abstractIn the first chapter we will cover theoretical background. -What are hackers, hacker types and hacking history.-What is hacking, active hacking, passive hacking. -What is malicious software, different malware types.-Malware infects target in the form of Trojan horse thus creating a botnet. -Malicius Trojan horse software infects target through a game and begins to monitor and record what the user types.In the third chapter will follow practical techniques. -Breaking wpa2 personal LANs and after techniques of the man in the middle in other computer systems. -Attacks on PCs with backdoor implantation techniques and access the machine by Metasploit Framework platform. -Sql injection attacks into vunerable websites for extracting information from databases.en
heal.languageΕλληνικάel
heal.languageGreeken
heal.academicPublisherΤ.Ε.Ι. Κρήτης, Τεχνολογικών Εφαρμογών (Σ.Τ.Εφ), Τμήμα Μηχανικών Πληροφορικής Τ.Ε.el
heal.academicPublisherT.E.I. of Crete, School of Engineering (STEF), Department of Informatics Engineeringen
heal.titleΚακόβουλο λογισμικό, active hacking, passive hacking.el
heal.titleMalware, active hacking, passive hacking.en
heal.typeΠτυχιακή Εργασίαel
heal.typeBachelor thesisen
heal.keywordχάκερ υπολογιστών, κακόβουλο λογισμικό, ασφάλεια δικτύουel
heal.keywordcomputer hacker, malware, network securityen
heal.accessfreeel
heal.advisorNameΠαπαδάκης, Νικόλαοςel
heal.advisorNamePapadakis, Nikolaosen
heal.advisorID.emailnpapadak@ie.teicrete.gr
heal.academicPublisherIDΤ.Ε.Ι. Κρήτηςel
heal.academicPublisherIDT.E.I. of Creteen
heal.fullTextAvailabilitytrueel
tcd.distinguishedfalseel
tcd.surveyfalseel


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record

Attribution-NonCommercial-NoDerivs 3.0 United States
Except where otherwise noted, this item's license is described as Attribution-NonCommercial-NoDerivs 3.0 United States