Attacking an ERP with Open Source Software

被引:0
|
作者
Astudillo, Catalina [1 ]
Carvajal, Fabian [1 ]
Pablo Carvallo, Juan [1 ]
Crespo-Martinez, Esteban [1 ]
Orellana, Marcos [1 ]
Vintimilla, Rosalva [1 ]
机构
[1] Univ Azuay, Cuenca, Ecuador
来源
ENFOQUE UTE | 2018年 / 9卷 / 01期
关键词
Pentesting; IT Security; Hacking; ERP; APEX;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Information security is a growing concern in companies and organizations, being even higher when linked to financial platforms where sensitive information exists. This article explains the techniques used in the pentesting performed on the ERP software developed in APEX 5 by the University of Azuay. To achieve this goal, six stages has been considered for perform a penetration test: I) Conceptualization, where is defined the scope of the tests to be performed. II) Preparation of the laboratory, which identifies some of the tools used to initiate the safety tests. III) Obtaining of information, where the possible objects are recognized and scanned in greater depth to identify intrinsic characteristics for subsequently exploit them. IV) Analysis of the vulnerabilities found in the previous stage. V) Exploitation of vulnerabilities; and VI) Post- exploitation, a stage that contemplates the destruction of evidence of the attack and the conservation of the connection and the accesses obtained to extract information. All these stages were carried out within the facilities of the "Universidad del Azuay", considering the development environment in which this software is currently located.
引用
收藏
页码:138 / 148
页数:11
相关论文
共 50 条
  • [1] Building a Service-Oriented ERP from an Open Source Software
    Kouamou, Georges Edouard
    [J]. 2009 FOURTH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING ADVANCES (ICSEA 2009), 2009, : 33 - 38
  • [2] The Power of Open Source ERP
    Carstea, Claudia
    [J]. ADVANCES IN MANUFACTURING ENGINEERING, QUALITY AND PRODUCTION SYSTEMS, VOL I, 2009, : 151 - +
  • [3] Open Source ERP Systems
    Sudzina, Frantisek
    [J]. STRATEGIC MANAGEMENT AND ITS SUPPORT BY INFORMATION SYSTEMS, 9TH INTERNATIONAL CONFERENCE, 2011, : 225 - 233
  • [4] Open source software
    Irwin, B
    [J]. LIBRARY JOURNAL, 2000, 125 (02) : 8 - 8
  • [5] Open Source Software
    Gaff, Brian M.
    Ploussios, Gregory J.
    [J]. COMPUTER, 2012, 45 (06) : 9 - 11
  • [6] The Open Source Software model and a business case for Open Source Software implementation: Creating a symbiotic open source solution
    Rea, AI
    [J]. INFORMATION TECHNOLOGY AND ORGANIZATIONS: TRENDS, ISSUES, CHALLENGES AND SOLUTIONS, VOLS 1 AND 2, 2003, : 977 - 978
  • [7] A robust open source exchange for open source software development
    Basu, Amit
    [J]. OPEN SOURCE SYSTEMS, 2006, 203 : 99 - 108
  • [8] The future of open source software
    Appelbe, B
    [J]. JOURNAL OF RESEARCH AND PRACTICE IN INFORMATION TECHNOLOGY, 2003, 35 (04): : 227 - 236
  • [9] On the security of open source software
    Payne, C
    [J]. INFORMATION SYSTEMS JOURNAL, 2002, 12 (01) : 61 - 78
  • [10] Open source clustering software
    de Hoon, MJL
    Imoto, S
    Nolan, J
    Miyano, S
    [J]. BIOINFORMATICS, 2004, 20 (09) : 1453 - 1454