Searched for: subject%3A%22Security%22
(1 - 3 of 3)
document
Pletinckx, Stijn (author)
Security misconfigurations and neglected updates commonly lead to systems being vulnerable. Ranging from default passwords to unpatched software, many systems, such as websites or databases, are being compromised due to these pitfalls. Often stemming from human error, it is difficult to avoid these misconfigurations, which is why they are...
master thesis 2021
document
Pletinckx, S.R.G. (author), Borgolte, K. (author), Fiebig, T. (author)
Security misconfigurations and neglected updates commonly lead to systems being vulnerable. Especially in the context of websites, we often find pages that were forgotten, that is, they were left online after they served their purpose and never updated thereafter. In this paper, we introduce new methodology to detect such forgotten or...
conference paper 2021
document
Pletinckx, Stijn (author)
Prior to exploiting a vulnerable service, adversaries perform a port scan to detect open ports on a target machine. If an adversary is aiming for multiple targets, multiple IP addresses need to be scanned for possible open ports. As sending all this probing traffic with one source IP address causes a lot of suspicion in an intrusion detection...
bachelor thesis 2018