-
1
Automatic detection method of software upgrade vulnerability based on network traffic analysis
Published 2020-02-01“…During the software upgrade process,the lack of authentication for upgrade information or packages can lead to remote code execution vulnerabilities based on man-in-the-middle attack.An automatic detection method for upgrading vulnerabilities was proposed.The method described the upgrade mechanism by extracting the network traffic during the upgrade process,then matched it with the vulnerability feature vector to anticipate upgrading vulnerabilities.In a validation environment,the man-in-the-middle attack using the portrait information was carried out to verify the detection results.In addition,an automatic vulnerability analysis and verification system based on this method was designed.184 Windows applications samples was test and 117 upgrade vulnerabilities were detected in these samples,which proved validity of the method.…”
Get full text
Article -
2
Monitoring Keamanan Runtime pada Kubernetes Menggunakan Falco
Published 2025-05-01“…Proses pengujian kapabilitas deteksi dilakukan terhadap tiga skenario serangan yang termasuk kedalam daftar resiko yang ada pada OWASP Top 10 Cloud-Native Application Security, di antaranya yaitu Remote Code Execution (RCE), exfiltration using common Linux binaries, dan privileged container. …”
Get full text
Article -
3
Uncovering Threats in Container Systems: A Study on Misconfigured Container Components in the Wild
Published 2024-01-01“…We identify five distinct vulnerabilities that either leak sensitive information or allow remote code execution, demonstrating the real-world feasibility and potential impact of exploiting these misconfigured container components.…”
Get full text
Article -
4
A Cybersecurity Risk Assessment for Enhanced Security in Virtual Reality
Published 2025-05-01“…This methodology provides a comprehensive risk evaluation method, identifying critical vulnerabilities such as Remote Code Execution (RCE), social engineering, excessive permission exploitation, unauthorized access, and data exfiltration. …”
Get full text
Article -
5
Safety of Systems Integrating Fire Protection Equipment – Risks, Gaps, Recommendations
Published 2024-12-01“…It has been found that cybercriminals can use various techniques: denial-of- service (DoS) attacks, man-in-the-middle attacks, remote code execution and social engineering, to disrupt systems. …”
Get full text
Article -
6
A Comprehensive Analysis of Cybersecurity Infrastructure in Academic Environments
Published 2024-10-01“…Domain security analysis revealed critical vulnerabilities, including an outdated version of PHP and possible remote code execution (CVSS 9.8-10) in “virtual.ups.edu.ec”. …”
Get full text
Article -
7
Infrastructure as Code for Cybersecurity Training
Published 2023-10-01“…Lastly, we explore several up-to-date vulnerabilities that are constantly messing with the lives of individuals and organizations, most related to Privilege Escalation, Remote Code Execution attacks, and Incident Forensics, allowing the improvement of skills concerning Red team and Blue team scenarios. …”
Get full text
Article