•  
  •  
 
Information Sciences Letters

Information Sciences Letters

Abstract

The calamity begins if an attacker successfully compromises a system and gains access to high-level privileges. This paper presents and addresses a vulnerable Linux server with typical flaws and configuration errors. This paper aims to show how these widespread vulnerabilities might be used by an attacker to compromise the server. In order to prevent building and setting up a Linux server with risks and low security, as well as to guarantee the integrity and confidentiality of user and customer information, this paper instructs aspiring system administrators and developers on how to avoid making such errors in their initial configuration for this servers set of examples.

Share

COinS