I
nd
o
ne
s
ia
n J
o
urna
l o
f
E
lect
rica
l En
g
ineering
a
nd
Co
m
p
u
t
er
Science
Vo
l.
11
,
No
.
1
,
J
u
ly
201
8
,
p
p
.
51
~
59
I
SS
N:
2502
-
4752
,
DOI
: 1
0
.
1
1
5
9
1
/
i
j
ee
cs
.
v
11
.i
1
.
p
p
51
-
59
51
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//ia
e
s
co
r
e.
co
m/jo
u
r
n
a
ls
/in
d
ex
.
p
h
p
/
ijeec
s
O
n
the
Rev
iew
an
d Set
u
p of S
ecuri
t
y
Audit
Using
K
a
li Linux
T
eddy
Su
ry
a
G
un
a
w
a
n
1
,
M
uh
a
mm
a
d K
a
s
s
i
m
L
i
m
2
,
Nur
ul F
a
riza
Z
u
l
k
ur
na
in
3
,
M
ira
K
a
rt
i
w
i
4
1
,
2,
3
De
p
a
rtm
e
n
t
o
f
El
e
c
tri
c
a
l
a
n
d
Co
m
p
u
ter E
n
g
in
e
e
rin
g
,
K
u
ll
iy
y
a
h
o
f
En
g
in
e
e
rin
g
,
4
De
p
a
rtme
n
t
o
f
In
f
o
rm
a
ti
o
n
S
y
ste
m
s,
Ku
ll
iy
y
a
h
o
f
ICT
T
h
e
In
tern
a
ti
o
n
a
l
Isla
m
ic Un
iv
e
rs
it
y
M
a
la
y
sia
(IIUM
)
,
Ja
lan
G
o
m
b
a
k
,
5
3
1
0
0
K
u
a
la L
u
m
p
u
r,
M
a
lay
s
ia
Art
icle
I
nfo
AB
ST
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
J
an
9
,
2
0
1
8
R
ev
i
s
ed
Mar
2
7
,
2
0
1
8
A
cc
ep
ted
A
p
r
1
1
,
2
0
1
8
T
h
e
m
a
ss
i
v
e
d
e
v
e
lo
p
m
e
n
t
o
f
te
c
h
n
o
l
o
g
y
e
sp
e
c
iall
y
in
c
o
m
p
u
ters
,
m
o
b
il
e
d
e
v
ice
s,
a
n
d
n
e
tw
o
rk
in
g
h
a
s
b
rin
g
se
c
u
rit
y
issu
e
f
o
r
w
a
rd
a
s
p
rim
a
ril
y
c
o
n
c
e
rn
.
T
h
e
c
o
m
p
u
ters
a
n
d
m
o
b
il
e
d
e
v
ice
s
c
o
n
n
e
c
ted
to
In
tern
e
t
a
re
e
x
p
o
se
d
to
n
u
m
e
ro
u
s
th
re
a
ts
a
n
d
e
x
p
lo
it
s.
W
it
h
th
e
u
ti
li
z
a
ti
o
n
o
f
p
e
n
e
tratio
n
tes
ti
n
g
,
v
u
ln
e
ra
b
il
it
ies
o
f
a
s
y
ste
m
c
a
n
b
e
id
e
n
ti
f
ied
a
n
d
si
m
u
late
d
a
tt
a
c
k
c
a
n
b
e
lau
n
c
h
e
d
to
d
e
term
in
e
h
o
w
se
v
e
r
e
th
e
v
u
ln
e
ra
b
il
it
ies
a
re
.
Th
is
p
a
p
e
r
re
v
ie
w
e
d
so
m
e
o
f
th
e
se
c
u
rit
y
c
o
n
c
e
p
ts,
in
c
lu
d
in
g
p
e
n
e
trati
o
n
tes
ti
n
g
,
se
c
u
rit
y
a
n
a
l
y
sis,
a
n
d
se
c
u
rit
y
a
u
d
it
.
On
th
e
o
t
h
e
r
h
a
n
d
,
Ka
li
L
in
u
x
is
t
h
e
m
o
st
p
o
p
u
lar
p
e
n
e
trati
o
n
tes
ti
n
g
a
n
d
se
c
u
rit
y
a
u
d
it
p
latf
o
rm
w
it
h
a
d
v
a
n
c
e
d
to
o
ls
to
d
e
tec
t
a
n
y
v
u
ln
e
ra
b
il
it
i
e
s
u
n
c
o
v
e
re
d
i
n
t
h
e
targ
e
t
m
a
c
h
in
e
.
F
o
r
th
is
p
u
r
p
o
se
,
Ka
li
L
in
u
x
se
tu
p
a
n
d
i
n
sta
ll
a
ti
o
n
w
il
l
b
e
d
e
sc
rib
e
d
in
m
o
re
d
e
tails.
M
o
re
o
v
e
r,
a
m
e
th
o
d
to
in
sta
ll
v
u
ln
e
ra
b
le
se
rv
e
r
wa
s
a
lso
p
re
se
n
ted
.
F
u
rt
h
e
r
re
se
a
rc
h
in
c
lu
d
in
g
sim
u
late
d
a
tt
a
c
k
s
to
v
u
ln
e
ra
b
le
se
rv
e
r
o
n
b
o
t
h
w
e
b
a
n
d
f
ire
wa
ll
s
y
ste
m
w
il
l
b
e
c
o
n
d
u
c
ted
.
K
ey
w
o
r
d
s
:
C
o
m
p
u
ter
Secu
r
it
y
Kali
L
i
n
u
x
P
en
etr
atio
n
T
esti
n
g
Secu
r
it
y
A
n
a
l
y
s
is
Secu
r
it
y
A
u
d
it
Co
p
y
rig
h
t
©
2
0
1
8
In
stit
u
te o
f
A
d
v
a
n
c
e
d
E
n
g
i
n
e
e
rin
g
a
n
d
S
c
ien
c
e
.
Al
l
rig
h
ts re
se
rv
e
d
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
T
ed
d
y
S
u
r
y
a
G
u
n
a
w
an
,
De
p
a
rtme
n
t
o
f
El
e
c
tri
c
a
l
a
n
d
Co
m
p
u
ter E
n
g
in
e
e
rin
g
,
Ku
ll
iy
y
a
h
o
f
En
g
in
e
e
rin
g
In
tern
a
ti
o
n
a
l
Isla
m
ic Un
iv
e
rsit
y
M
a
la
y
sia
E
m
ail:
t
s
g
u
n
a
w
an
@
i
iu
m
.
ed
u
.
m
y
1.
I
NT
RO
D
UCT
I
O
N
No
w
ad
a
y
s
,
co
m
p
u
ter
is
co
n
s
id
er
ed
ess
en
t
ial
to
ev
er
y
o
n
e
f
r
o
m
y
o
u
n
g
to
o
ld
,
s
tu
d
e
n
ts
to
t
h
e
co
r
p
o
r
ates.
T
h
e
n
u
m
b
er
o
f
co
m
p
u
ter
is
g
r
o
w
i
n
g
r
ap
id
l
y
e
v
e
r
y
y
ea
r
.
T
h
is
r
ap
id
g
r
o
w
t
h
o
f
n
u
m
b
er
o
f
co
m
p
u
ter
ea
ch
y
ea
r
lead
s
to
t
h
e
s
ec
u
r
i
t
y
co
n
ce
r
n
.
T
h
e
co
m
p
u
ter
s
ec
u
r
i
t
y
i
s
v
ital
b
ec
au
s
e
th
e
ad
v
er
s
ar
ies
ar
e
al
w
a
y
s
lo
o
k
in
g
f
o
r
o
p
p
o
r
tu
n
it
y
an
d
v
u
ln
er
ab
ili
t
y
to
ch
a
llen
g
e
th
e
s
ec
u
r
it
y
.
A
cc
o
r
d
in
g
to
[
1
]
,
s
ec
u
r
it
y
is
n
o
t
j
u
s
t
t
h
e
n
o
tio
n
o
f
b
ei
n
g
f
r
ee
f
r
o
m
d
an
g
er
,
as
i
t
is
co
m
m
o
n
l
y
co
n
c
eiv
ed
,
b
u
t
is
a
s
s
o
ciate
d
w
it
h
th
e
p
r
esen
ce
o
f
an
ad
v
er
s
ar
y
.
T
h
e
p
r
esen
ce
o
f
ad
v
er
s
ar
y
w
h
o
is
al
w
a
y
s
s
e
ek
in
g
to
o
b
tain
s
e
n
s
iti
v
e
an
d
p
r
iv
ate
p
er
s
o
n
al
in
f
o
r
m
atio
n
,
t
h
r
ea
t t
h
e
s
y
s
te
m
,
an
d
u
s
e
it a
g
ai
n
s
t it
s
leg
iti
m
at
e
u
s
e
m
ak
e
s
th
e
co
m
p
u
ter
s
ec
u
r
it
y
p
ar
a
m
o
u
n
t.
(
a)
Desk
to
p
Op
er
atin
g
S
y
s
te
m
s
(
b
)
Mo
b
ile
Op
er
atin
g
S
y
s
te
m
s
Fig
u
r
e
1
.
Ma
r
k
et
Sh
ar
e
o
f
De
s
k
to
p
an
d
Mo
b
ile
Op
er
atin
g
S
y
s
te
m
s
(
Stat
C
o
u
n
ter
Glo
b
al
Sta
ts
,
2
0
1
7
)
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4752
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci,
Vo
l
.
11
,
No
.
1
,
J
u
ly
201
8
:
51
–
59
52
T
h
e
Op
er
atin
g
S
y
s
te
m
(
O
S)
is
a
p
r
o
g
r
a
m
co
m
p
r
is
e
s
w
i
th
m
il
lio
n
lin
e
s
o
f
co
d
in
g
t
h
at
ac
ts
as
an
in
ter
m
ed
iar
y
b
et
w
ee
n
a
u
s
er
o
f
a
co
m
p
u
ter
an
d
t
h
e
co
m
p
u
ter
h
ar
d
w
ar
e.
T
h
er
e
ar
e
lo
t
o
f
OS
r
u
n
n
i
n
g
o
n
t
h
e
co
m
p
u
ter
,
b
u
t
o
n
l
y
t
h
r
ee
o
f
t
h
e
m
ar
e
w
id
el
y
u
s
ed
,
in
c
lu
d
i
n
g
W
in
d
o
w
s
OS,
Ma
c
OS
a
n
d
L
in
u
x
OS.
B
ased
o
n
Fig
u
r
e
1
(
a)
,
it
ca
n
b
e
s
ee
n
th
at
W
in
d
o
w
s
OS
i
s
d
o
m
in
at
in
g
th
e
co
m
p
u
ter
OS
at
8
3
.
9
3
%,
Ma
c
OS
ca
m
e
at
s
ec
o
n
d
w
it
h
1
0
.
2
9
%
an
d
L
i
n
u
x
OS
at
th
ir
d
w
it
h
3
.
7
6
%.
T
h
is
m
ea
n
s
th
at
W
in
d
o
w
s
O
S
is
ex
p
o
s
ed
to
lo
t
o
f
v
u
l
n
er
ab
ili
t
y
b
ec
a
u
s
e
o
f
it
w
i
d
ely
u
s
ed
.
I
n
[
2
]
,
th
e
au
th
o
r
s
tated
th
at
th
e
o
p
er
atin
g
s
y
s
te
m
s
w
it
h
v
a
s
t
n
u
m
b
er
o
f
u
s
er
s
lik
e
Mic
r
o
s
o
f
t
W
in
d
o
w
s
o
r
L
in
u
x
is
e
x
p
o
s
ed
to
th
e
m
alicio
u
s
co
d
e
attac
k
s
w
h
ic
h
co
m
e
s
f
r
o
m
m
a
n
-
in
-
th
e
-
m
id
d
le
-
a
ttack
(
MI
T
M)
.
Fo
r
m
o
b
ile
o
p
er
atin
g
s
y
s
te
m
s
,
An
d
r
o
id
an
d
iOS
ar
e
d
o
m
i
n
ati
n
g
t
h
e
o
p
er
atin
g
s
y
s
te
m
s
in
s
m
ar
tp
h
o
n
e.
Fi
g
u
r
e
1
(
b
)
s
h
o
ws
th
a
t
w
it
h
6
9
.
6
8
%
An
d
r
o
id
is
cu
r
r
en
tl
y
lead
i
n
g
th
e
r
ac
e
le
a
v
in
g
i
OS
at
s
ec
o
n
d
w
it
h
1
9
.
3
5
%.
I
n
t
h
e
ca
s
e
o
f
s
m
ar
tp
h
o
n
e,
An
d
r
o
id
is
a
n
o
p
en
-
s
o
u
r
ce
p
lat
f
o
r
m
w
h
er
e
t
h
er
e’
s
n
o
r
o
y
alt
y
’
s
f
ee
t
o
d
ev
elo
p
f
o
r
t
h
e
p
lat
f
o
r
m
.
T
h
e
s
o
u
r
ce
-
co
d
e
is
t
h
er
e
o
n
t
h
e
i
n
ter
n
et,
an
d
e
v
er
y
b
o
d
y
ca
n
u
s
e
it
f
r
ee
l
y
w
i
th
o
u
t
v
io
lati
n
g
an
y
co
p
y
r
i
g
h
t
ac
t
s
.
As
m
en
tio
n
ed
i
n
[
3
]
,
t
h
e
w
h
o
le
s
o
u
r
ce
co
d
e
o
f
An
d
r
o
id
Op
er
atin
g
S
y
s
te
m
s
i
s
f
r
ee
to
u
s
e
w
h
ich
l
y
i
n
g
u
n
d
er
th
e
Ge
n
er
al
P
u
b
lic
L
ice
n
s
e
v
e
r
s
io
n
2
(
GP
L
v
2
)
w
h
er
e
a
n
y
i
m
p
r
o
v
is
atio
n
o
n
t
h
e
s
o
u
r
ce
-
co
d
e
b
y
an
y
th
ir
d
-
p
ar
t
y
d
ev
elo
p
er
s
m
u
s
t
b
e
r
e
m
ai
n
ed
u
n
d
er
th
e
o
p
en
-
s
o
u
r
ce
licen
s
i
n
g
ag
r
ee
m
en
t
ter
m
s
.
L
ik
e
w
i
s
e,
th
e
A
n
d
r
o
id
f
r
am
e
w
o
r
k
w
h
ic
h
is
d
is
tr
ib
u
ted
u
n
d
er
A
p
ac
h
e
So
f
t
w
ar
e
L
ice
n
s
e
(
A
S
L
/
A
p
ac
h
e2
)
p
er
m
its
th
e
o
p
en
an
d
clo
s
ed
-
co
d
e
th
at
h
a
v
e
b
ee
n
d
er
iv
ed
f
r
o
m
t
h
e
o
r
ig
i
n
al
s
o
u
r
ce
co
d
e
[
3
]
.
B
ec
au
s
e
o
f
th
i
s
o
p
en
-
s
o
u
r
ce
co
d
e
p
r
ac
tices
b
y
An
d
r
o
id
an
d
it
w
id
el
y
u
s
ed
,
it
ex
p
o
s
es
to
n
u
m
er
o
u
s
m
a
licio
u
s
th
r
ea
ts
.
I
n
C
i
s
co
2
0
1
4
A
n
n
u
al
Secu
r
it
y
r
ep
o
r
t,
th
e
y
r
ep
o
r
ted
th
at
t
h
e
s
i
g
n
i
f
i
ca
n
t
l
y
r
ap
id
l
y
g
r
o
w
t
h
o
f
n
u
m
b
er
o
f
An
d
r
o
id
’
s
u
s
er
s
m
a
k
es it b
e
co
m
e
s
f
a
v
o
u
r
ab
le
tar
g
e
t o
f
m
a
l
w
ar
e
attac
k
s
[
4
]
.
C
o
m
p
u
ter
s
ec
u
r
it
y
ca
n
b
e
p
er
ce
iv
ed
at
t
w
o
d
i
f
f
er
en
t
p
er
s
p
ec
tiv
es
:
co
m
p
u
ter
t
h
at
i
s
co
n
n
e
cted
to
th
e
n
et
w
o
r
k
an
d
th
e
o
n
e
w
h
o
d
o
es
n
o
t.
T
h
e
p
r
i
m
ar
il
y
co
n
ce
r
n
ab
o
u
t
th
e
s
ec
u
r
it
y
i
s
t
h
e
co
m
p
u
ter
w
h
ic
h
i
s
co
n
n
ec
ted
to
th
e
n
et
w
o
r
k
s
in
ce
m
o
s
t
o
f
t
h
e
co
m
p
u
ter
s
in
th
i
s
er
a
ar
e
co
n
n
ec
ted
to
t
h
e
n
et
w
o
r
k
.
Sec
u
r
e
co
m
p
u
ti
n
g
is
ac
h
iev
i
n
g
t
h
e
g
o
als
o
f
s
ec
u
r
it
y
i
n
i
n
f
o
r
m
a
tio
n
e
n
v
ir
o
n
m
e
n
t
f
r
o
m
t
h
r
ea
ts
;
t
h
e
g
o
als
ar
e
co
n
f
id
e
n
tialit
y
,
i
n
te
g
r
it
y
,
av
ai
l
ab
ilit
y
a
n
d
r
esil
ie
n
ce
[
1
]
.
C
o
n
f
id
en
t
ialit
y
i
s
ab
o
u
t
r
etai
n
i
n
g
eith
er
p
er
s
o
n
al
d
ata
o
r
o
r
g
an
izatio
n
al
d
ata
ex
c
lu
s
i
v
e.
I
n
te
g
r
it
y
i
s
p
r
eser
v
i
n
g
th
e
s
y
s
te
m
o
r
t
h
e
d
ata
f
r
o
m
b
ei
n
g
alter
ed
o
r
ch
an
g
ed
illeg
all
y
b
y
n
o
n
-
au
t
h
o
r
ized
u
s
er
s
[
5
]
.
Av
ailab
ilit
y
m
ea
n
s
b
ein
g
ab
le
to
u
s
e
t
h
e
s
y
s
te
m
as
an
t
icip
ated
.
An
d
r
esil
ien
ce
i
s
w
h
a
t a
llo
w
s
a
s
y
s
te
m
to
en
d
u
r
e
s
ec
u
r
it
y
t
h
r
ea
ts
in
s
tead
o
f
cr
itical
l
y
f
aili
n
g
.
Kali
L
i
n
u
x
is
th
e
m
o
s
t
p
o
p
u
la
r
s
o
f
t
w
ar
e
p
ac
k
ag
e
f
o
r
p
en
etr
atio
n
te
s
ti
n
g
an
d
s
ec
u
r
i
t
y
au
d
i
t,
in
w
h
ich
m
an
y
b
o
o
k
s
h
av
e
b
ee
n
w
r
it
te
n
i
n
t
h
i
s
to
p
ic
[6
-
10]
.
T
h
e
o
b
jectiv
e
o
f
t
h
is
p
ap
er
is
to
p
r
o
v
i
d
e
a
co
m
p
r
eh
e
n
s
i
v
e
r
ev
ie
w
o
n
t
h
e
s
ec
u
r
it
y
p
e
n
etr
atio
n
a
n
d
s
ec
u
r
it
y
a
u
d
it
u
s
i
n
g
Kali
L
i
n
u
x
.
Sectio
n
2
d
escr
i
b
es
th
e
p
en
etr
atio
n
test
i
n
g
,
w
h
ile
Sectio
n
3
ex
p
lai
n
s
ab
o
u
t
th
e
r
o
le
o
f
s
ec
u
r
it
y
a
n
al
y
s
i
s
.
Sectio
n
4
d
escr
ib
es
s
e
cu
r
it
y
au
d
it,
w
h
il
e
Sectio
n
5
d
escr
ib
es th
e
s
et
u
p
o
f
Kali
L
in
u
x
.
T
h
e
last
s
ec
tio
n
co
n
clu
d
es t
h
is
p
ap
er
.
2.
P
E
NE
T
RA
T
I
O
N
T
E
ST
I
N
G
P
en
etr
atio
n
test
i
n
g
is
a
le
g
iti
m
ate
ex
er
ci
s
e
o
f
e
x
p
lo
itin
g
a
s
y
s
te
m
w
i
th
r
ea
l
li
f
e
attac
k
e
r
s
ce
n
ar
io
in
cl
u
d
in
g
ille
g
al
ac
ce
s
s
a
n
d
th
e
p
r
ac
tice
o
f
m
alic
io
u
s
ac
ti
v
it
i
es.
T
h
e
p
r
o
ce
s
s
o
f
p
en
etr
atio
n
test
in
g
s
tar
t
s
f
r
o
m
id
en
ti
f
y
t
h
e
s
y
s
te
m
’
s
v
u
l
n
er
ab
ilit
ies,
s
t
a
g
e
an
ex
p
lo
itatio
n
,
v
u
ln
er
ab
ilit
ies
’
d
is
co
v
er
y
an
d
r
ep
o
r
tin
g
,
an
d
d
is
s
o
lv
i
n
g
t
h
e
v
u
l
n
er
ab
ilit
ies
t
h
at
ca
n
ca
u
s
e
h
ar
m
to
t
h
e
s
y
s
t
e
m
.
A
cc
o
r
d
in
g
to
[
1
1
]
,
th
e
p
r
o
ce
s
s
o
f
p
e
n
etr
atio
n
test
i
n
g
co
u
ld
ill
u
s
tr
ate
t
h
e
lev
el
o
f
s
ev
er
it
y
co
u
ld
b
e
d
o
n
e
o
n
th
e
s
y
s
te
m
d
u
r
i
n
g
t
h
e
r
ea
l
lif
e
attac
k
t
h
u
s
h
elp
th
e
o
r
g
a
n
izatio
n
to
p
r
ev
en
t
it
b
ef
o
r
e
it
is
to
o
late.
T
h
er
e
ar
e
n
u
m
er
o
u
s
attac
k
s
t
h
at
ca
n
ca
u
s
e
d
a
m
ag
e
to
o
n
e
o
r
g
an
izatio
n
’
s
s
y
s
te
m
.
A
cc
o
r
d
in
g
to
Op
en
W
eb
A
p
p
licati
o
n
Secu
r
it
y
P
r
o
j
ec
t
(
OW
A
S
P
)
th
er
e
ar
e
to
p
1
0
v
u
l
n
er
ab
ilit
ie
s
t
h
at
b
ee
n
lea
v
i
n
g
s
e
v
er
e
i
m
p
ac
t
to
w
eb
ap
p
li
ca
tio
n
a
n
d
f
o
u
r
o
f
t
h
e
m
i
n
cl
u
d
in
g
SQ
L
i
n
j
ec
tio
n
,
C
r
o
s
s
S
ite
Scr
ip
ti
n
g
(
XSS),
L
o
ca
l
Fi
le
I
n
cl
u
s
io
n
(
L
FI)
,
a
n
d
R
e
m
o
te
Fi
le
I
n
cl
u
s
io
n
(
R
FI
)
as
m
e
n
tio
n
ed
b
y
[
1
1
]
.
2
.
1
SQ
L
I
nje
ct
io
ns
(
S
Q
L
i)
Stru
ct
u
r
ed
Qu
er
y
L
a
n
g
u
a
g
e
(
SQL
)
is
n
o
r
m
all
y
u
s
ed
as
in
t
er
m
ed
iate
b
et
w
ee
n
w
eb
ap
p
licatio
n
s
an
d
d
atab
ase.
SQL
r
esp
o
n
s
ib
le
i
n
t
ak
in
g
ca
r
e
o
f
r
eq
u
e
s
t
a
n
d
r
etr
i
ev
e
o
f
d
ata
f
r
o
m
clie
n
t
s
id
e
to
d
atab
ase
an
d
b
ac
k
an
d
f
o
r
th
.
A
cc
o
r
d
in
g
to
[
1
2
]
,
SQ
L
p
la
y
s
a
s
i
g
n
if
ican
t
r
o
le
in
t
h
e
R
e
latio
n
Da
tab
ase
M
an
ag
e
m
e
n
t
S
y
s
te
m
(
R
DB
MS)
d
u
e
to
its
s
i
m
p
licit
y
a
n
d
s
tr
ai
g
h
tf
o
r
w
ar
d
n
es
s
.
S
QL
in
j
ec
tio
n
o
cc
u
r
s
w
h
e
n
a
n
attac
k
er
i
n
j
ec
ts
t
h
e
SQL
q
u
er
ies
w
it
h
n
e
w
p
ar
a
m
e
ter
s
in
to
th
e
in
p
u
t
v
al
u
es
to
e
n
ter
an
d
g
a
in
ac
ce
s
s
to
th
e
d
atab
ase
u
n
au
t
h
o
r
ized
.
T
h
e
attac
k
o
cc
u
r
s
w
h
e
n
k
e
y
wo
r
d
s
o
r
o
p
er
ato
r
s
o
b
tain
f
r
o
m
th
e
u
s
er
b
y
th
e
ap
p
licatio
n
s
er
v
er
e
x
ec
u
t
ed
to
t
h
e
co
m
p
r
o
m
is
ed
u
p
d
ated
SQ
L
q
u
er
y
.
2
.
2
Cro
s
s
Site
Script
i
ng
(
XSS)
XSS
is
a
tech
n
iq
u
e
w
h
er
e
t
h
e
J
av
aScr
ip
t,
VB
Scr
ip
t,
A
cti
v
e
X,
Flas
h
o
r
HT
ML
is
p
lan
ted
alo
n
g
w
i
th
th
e
m
al
icio
u
s
X
SS
li
n
k
.
W
h
e
n
th
e
i
n
f
ec
ted
li
n
k
i
s
ex
ec
u
ted
o
r
lo
a
d
ed
,
th
e
attac
k
er
w
i
ll
o
b
t
ain
r
o
o
t
p
r
iv
ileg
e
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2502
-
4752
On
th
e
R
ev
iew
a
n
d
S
etu
p
o
f S
e
cu
r
ity
A
u
d
it u
s
in
g
K
a
li Lin
u
x
(
Ted
d
y
S
u
r
ya
Gu
n
a
w
a
n)
53
an
d
all
th
e
s
en
s
iti
v
e
d
ata
an
d
in
f
o
r
m
atio
n
w
ill
b
e
lef
t
ex
p
o
s
ed
to
th
e
attac
k
er
.
I
n
[
1
3
]
,
th
e
au
th
o
r
s
s
tated
th
at
th
er
e
ar
e
d
is
t
in
ct
n
u
m
b
er
s
o
f
w
a
y
ap
p
r
o
ac
h
ed
b
y
t
h
e
a
ttack
er
s
li
k
e
h
ij
ac
k
in
g
t
h
e
s
es
s
io
n
,
tak
i
n
g
ad
v
a
n
tag
e
o
f
u
s
er
’
s
p
r
i
v
ile
g
es b
y
s
teali
n
g
d
ata,
p
o
s
tin
g
ad
s
i
n
h
id
d
en
I
F
R
A
ME
an
d
p
o
p
-
u
p
to
e
n
co
d
e
th
e
m
al
icio
u
s
co
d
e
to
m
ai
n
tai
n
th
e
o
r
ig
i
n
alit
y
o
f
th
e
in
f
ec
ted
co
d
e
th
er
ef
o
r
e
it
ca
n
n
o
t
b
e
d
etec
ted
b
y
th
e
u
s
er
s
.
XSS
co
u
ld
b
e
in
itiated
t
h
r
o
u
g
h
s
e
n
d
in
g
e
m
a
il,
s
tealin
g
u
s
er
’
s
co
o
k
ies,
s
e
n
d
in
g
an
u
n
a
u
t
h
o
r
ized
r
eq
u
est,
an
d
XSS
attac
k
i
n
co
m
m
e
n
t
f
ield
.
2
.
3
L
o
ca
l F
ile
I
nclu
s
io
n (
L
F
I
)
a
nd
Re
m
o
t
e
F
ile
I
ncl
us
io
n (
R
F
I
)
L
o
ca
l
Fil
e
I
n
cl
u
s
io
n
(
L
FI)
is
an
attac
k
w
h
er
e
th
e
a
ttack
e
r
e
x
ec
u
te
s
co
m
m
a
n
d
s
i
n
s
o
m
e
f
i
les
lo
ca
ted
in
t
h
e
w
eb
s
er
v
er
af
ter
ex
p
lo
it
in
g
th
e
w
eb
ap
p
licatio
n
s
.
T
h
e
w
o
r
d
“
L
o
ca
l”
r
e
f
er
r
ed
to
th
e
lo
ca
tio
n
o
f
t
h
e
f
ile
ex
ec
u
ted
,
w
h
ich
i
s
i
n
s
id
e
th
e
w
eb
s
er
v
er
.
T
h
e
ex
p
lo
itatio
n
o
cc
u
r
s
d
u
e
to
m
is
u
s
e
o
f
p
r
eb
u
ilt
p
r
o
g
r
a
m
m
i
n
g
f
u
n
ctio
n
s
/
m
et
h
o
d
s
o
th
er
t
h
an
in
v
a
lid
p
ar
a
m
eter
ch
o
s
e
b
y
t
h
e
u
s
er
[
1
4
]
.
A
d
y
n
a
m
ic
f
ile
i
n
clu
s
io
n
m
ec
h
a
n
is
m
is
ap
p
r
o
ac
h
ed
to
co
u
n
ter
th
is
v
u
ln
er
ab
ili
t
y
.
R
e
m
o
te
Fi
le
I
n
cl
u
s
io
n
(
R
FI)
o
cc
u
r
s
w
h
e
n
an
y
t
y
p
e
o
f
u
s
er
i
n
p
u
t
is
r
e
m
o
tel
y
ac
ce
p
ted
w
it
h
o
u
t
g
o
i
n
g
th
r
o
u
g
h
a
n
y
p
r
o
p
er
v
alid
atio
n
an
d
s
a
n
itizat
io
n
b
y
t
h
e
s
er
v
er
.
R
FI
a
n
d
L
FI
ar
e
n
o
t
m
u
c
h
d
if
f
er
en
t
w
h
er
e
R
FI
in
cl
u
d
es
d
ictio
n
ar
y
w
r
i
teab
le,
i.e
.
th
e
p
ath
o
f
ce
r
tai
n
f
i
le
i
n
clu
d
ed
as
i
n
p
u
t
r
ec
ei
v
ed
b
y
th
e
w
eb
p
ag
e
is
n
o
t
co
m
p
r
e
h
en
s
iv
e
l
y
i
n
s
p
ec
ted
[
1
4
]
.
T
h
is
R
FI
attac
k
i
s
s
e
v
er
el
y
d
an
g
er
o
u
s
a
s
p
er
s
o
n
al
a
n
d
s
en
s
iti
v
e
d
ata
co
u
ld
b
e
s
t
ea
l a
n
d
m
a
n
ip
u
lated
a
n
d
,
co
u
ld
p
ar
aly
ze
t
h
e
w
eb
s
er
v
er
o
p
er
atio
n
.
2
.
4
Dis
t
ribute
d
-
De
nia
l
-
of
-
Serv
ice
(
DDo
S)
Dis
tr
ib
u
ted
De
n
ial
o
f
Ser
v
ice
(
DDo
S)
attac
k
s
ar
e
f
atal.
I
n
t
h
is
t
y
p
e
o
f
at
tack
,
le
g
iti
m
ate
u
s
er
s
w
o
u
ld
n
o
t
g
e
t
ac
ce
s
s
to
a
s
p
ec
i
f
ic
n
et
w
o
r
k
r
e
s
o
u
r
ce
b
ec
au
s
e
t
h
e
n
et
w
o
r
k
a
n
d
s
er
v
ices
h
a
v
e
b
ee
n
f
lo
o
d
in
g
w
it
h
f
al
s
e
s
er
v
ice
r
eq
u
e
s
t.
A
cc
o
r
d
in
g
to
[
1
5
,
1
6
]
,
th
e
DDo
S
attac
k
s
c
an
b
e
lau
n
c
h
ed
eith
er
b
y
d
is
t
u
r
b
in
g
a
le
g
iti
m
at
e
u
s
er
’
s
co
n
n
ec
ti
v
it
y
o
r
d
is
tu
r
b
i
n
g
le
g
iti
m
ate
s
u
s
er
’
s
s
er
v
ices.
2
.
5
M
a
n
-
in
-
t
he
-
M
idd
le
(
M
I
T
M
)
MI
T
M
attac
k
is
t
y
p
e
o
f
a
ttack
w
h
er
e
it
v
io
lates
t
w
o
o
f
s
ec
u
r
it
y
g
o
als
d
is
c
u
s
s
e
d
ea
r
lier
;
co
n
f
id
e
n
tialit
y
a
n
d
i
n
te
g
r
it
y
.
I
n
t
h
is
attac
k
,
t
h
e
at
tack
er
ea
v
esd
r
o
p
s
t
h
e
d
ata
f
lo
w
s
i
n
c
o
m
m
u
n
icatio
n
li
n
k
b
et
w
ee
n
en
d
p
o
in
t
s
.
A
s
m
e
n
ti
o
n
ed
in
[
1
7
]
,
in
co
m
m
o
n
MI
T
M
attac
k
,
th
r
ee
p
ar
ties
ar
e
i
n
v
o
l
v
ed
;
t
w
o
v
icti
m
s
th
at
ar
e
co
m
m
u
n
icati
n
g
w
it
h
ea
ch
o
th
er
an
d
an
attac
k
er
,
in
w
h
ich
t
h
e
attac
k
er
ex
p
lo
its
t
h
e
co
m
m
u
n
icatio
n
ch
an
n
el
b
et
w
ee
n
t
w
o
v
icti
m
s
an
d
h
as
th
e
ab
ili
t
y
to
m
a
n
o
eu
v
r
e
t
h
e
in
f
o
r
m
a
tio
n
e
x
ch
an
g
ed
.
I
n
[
1
8
]
,
th
e
au
th
o
r
s
s
ta
ted
t
h
at
t
h
e
MI
T
M
attac
k
is
in
cl
u
d
i
n
g
i
n
ter
ce
p
tin
g
e
m
ail
s
,
lo
g
in
s
,
c
h
at
m
e
s
s
a
g
e
s
,
cu
tti
n
g
a
v
icti
m
’
s
in
ter
n
e
t c
o
n
n
ec
tio
n
; a
n
d
m
a
n
y
o
th
er
s
.
2
.
6
Z
e
ro
-
Da
y
Vuln
er
a
bil
it
ies
Z
er
o
-
Da
y
v
u
l
n
er
ab
ilit
ies
r
ef
er
s
to
th
e
s
ec
u
r
it
y
r
i
s
k
w
h
ich
c
o
u
ld
b
e
ex
p
lo
ited
b
y
h
ac
k
er
b
u
t
h
as
y
et
k
n
o
w
n
b
y
t
h
e
s
o
f
t
w
ar
e
v
e
n
d
o
r
[
1
9
]
.
On
ce
th
e
v
e
n
d
o
r
lear
n
s
o
f
t
h
e
v
u
l
n
er
ab
ilit
y
,
th
e
v
en
d
o
r
w
ill
u
s
u
all
y
cr
ea
te
p
atch
es
to
m
i
tig
ate
it.
O
n
e
o
f
th
e
m
o
s
t
n
o
to
r
io
u
s
ex
a
m
p
le
o
f
ze
r
o
d
ay
attac
k
i
s
Stu
x
n
et
[
2
0
]
w
h
ic
h
u
s
es
4
W
in
d
o
w
s
o
p
er
atin
g
s
y
s
te
m
s
ze
r
o
-
d
a
y
e
x
p
lo
its
.
St
u
x
n
et
co
m
m
an
d
ed
t
h
e
P
L
C
s
to
s
p
ee
d
u
p
an
d
s
lo
w
d
o
wn
th
e
s
p
in
n
i
n
g
ce
n
tr
i
f
u
g
e
s
,
d
estro
y
i
n
g
s
o
m
e
o
f
t
h
e
m
,
w
h
ile
s
en
d
i
n
g
f
alse
d
ata
to
p
lan
t
o
p
er
ato
r
s
to
m
ak
e
i
t
ap
p
ea
r
th
e
ce
n
tr
if
u
g
e
s
w
er
e
b
eh
av
i
n
g
n
o
r
m
all
y
.
B
ased
o
n
t
h
i
s
Stu
x
n
et
attac
k
,
it
is
v
er
y
s
i
g
n
i
f
ican
t
to
k
ee
p
th
e
in
te
g
r
it
y
at
all
co
s
t.
3.
SE
CUR
I
T
Y
ANA
L
YS
T
Secu
r
it
y
a
n
al
y
s
t
d
o
es
co
m
p
r
e
h
en
s
i
v
e
an
a
l
y
s
is
b
ased
o
n
th
e
d
ata
g
at
h
er
ed
in
t
h
e
e
v
en
t
o
f
attac
k
o
r
atte
m
p
t
o
f
attac
k
o
r
a
n
n
u
al
r
e
p
o
r
t
to
id
en
tify
th
e
v
u
l
n
er
ab
il
ities
a
n
d
h
o
les
i
n
th
e
s
y
s
te
m
s
.
A
co
m
p
r
e
h
en
s
iv
e
an
al
y
s
is
m
ea
n
s
th
at,
e
v
er
y
p
iece
o
f
in
f
o
r
m
a
tio
n
a
n
d
in
f
o
r
m
atio
n
g
at
h
er
ed
m
u
s
t
b
e
i
n
s
p
ec
ted
,
ev
alu
ated
,
in
v
e
s
ti
g
ated
,
an
d
s
t
u
d
ied
p
r
o
f
o
u
n
d
l
y
.
No
t
o
n
l
y
t
h
at,
a
s
ec
u
r
it
y
an
al
y
s
t
m
u
s
t
b
e
ab
le
to
d
o
r
esear
ch
o
n
p
ast
c
y
b
er
-
attac
k
e
v
en
t
s
a
n
d
b
ein
g
ab
le
to
r
elate
it
to
cu
r
r
en
t
c
y
b
er
-
attac
k
.
Ho
w
e
v
er
,
th
e
s
e
m
eth
o
d
s
ar
e
n
o
lo
n
g
er
en
o
u
g
h
to
s
to
p
th
e
attac
k
s
an
d
co
n
s
id
er
ed
o
b
s
o
lete.
A
c
co
r
d
in
g
to
[
2
1
]
,
a
n
e
w
ag
e
o
f
w
ar
b
et
w
ee
n
attac
k
er
s
/
h
ac
k
er
s
a
n
d
s
ec
u
r
i
t
y
an
al
y
s
t
h
as
e
m
er
g
ed
w
h
er
e
b
o
th
p
ar
ties
e
m
p
lo
y
n
e
w
co
m
p
licated
s
ch
e
m
e
s
to
d
is
o
r
ien
t
ea
c
h
o
th
er
.
He
n
ce
,
n
e
w
s
tr
ateg
ie
s
ar
e
ap
p
r
o
ac
h
e
d
to
p
r
ep
ar
e
co
m
p
r
eh
en
s
i
v
e
f
o
r
ec
ast
o
f
i
m
m
i
n
en
t
th
r
ea
t
o
n
i
m
p
o
r
tan
t
u
tili
tie
s
;
k
n
o
w
n
a
s
P
r
ed
ictiv
e
C
y
b
er
Sit
u
atio
n
al
Aw
ar
en
e
s
s
(
S
A
)
.
T
h
ese
ap
p
r
o
ac
h
es
in
v
o
l
v
ed
d
ee
p
k
n
o
w
led
g
e
o
n
s
y
s
te
m
w
ea
k
n
e
s
s
a
n
d
h
o
w
it c
o
u
ld
b
e
u
s
ed
to
ab
u
s
e
th
e
s
y
s
te
m
.
Secu
r
it
y
an
a
l
y
s
t i
s
co
n
s
id
er
ed
d
em
a
n
d
i
n
g
j
o
b
n
o
w
ad
a
y
s
.
T
h
e
n
ee
d
s
o
f
h
a
v
i
n
g
s
ec
u
r
e
s
y
s
te
m
b
o
th
f
o
r
in
d
iv
id
u
al
an
d
o
r
g
a
n
izatio
n
a
l
u
s
e
s
m
a
k
e
th
e
s
ec
u
r
it
y
an
a
l
y
s
t
is
co
n
s
id
er
ed
o
n
e
o
f
i
m
p
o
r
tan
t
j
o
b
in
th
ese
f
a
s
t
-
ev
o
lv
i
n
g
tech
n
o
lo
g
ie
s
.
Secu
r
i
t
y
an
al
y
s
t
o
r
cy
b
er
d
ef
en
s
e
a
n
al
y
s
t
r
o
le
d
o
m
i
n
ati
n
g
th
e
o
p
er
atio
n
al
asp
ec
ts
o
f
p
r
eser
v
in
g
th
e
s
ec
u
r
it
y
o
f
t
h
e
o
r
g
an
izati
o
n
al.
T
h
e
ca
p
a
b
ilit
ies
o
f
s
ec
u
r
it
y
a
n
al
y
s
t
i
n
ex
a
m
in
in
g
t
h
e
cu
r
r
en
t
an
d
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4752
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci,
Vo
l
.
11
,
No
.
1
,
J
u
ly
201
8
:
51
–
59
54
in
co
m
i
n
g
t
h
r
ea
ts
to
t
h
e
o
r
g
a
n
izatio
n
m
ak
in
g
t
h
e
ad
v
a
n
ta
g
e
s
’
l
is
t
o
f
s
ec
u
r
it
y
an
a
l
y
s
t
k
ee
p
g
o
in
g
o
n
a
n
d
o
n
.
Hav
i
n
g
s
aid
t
h
at,
th
er
e
ar
e
s
e
v
en
q
u
esti
o
n
s
t
h
at
s
ec
u
r
i
t
y
a
n
al
y
s
t
n
ee
d
s
to
a
n
s
w
er
r
e
g
ar
d
in
g
th
e
s
ec
u
r
it
y
le
v
el
o
f
an
o
r
g
an
izatio
n
in
r
esp
ec
t
to
C
y
b
er
Sit
u
atio
n
al
A
w
ar
en
e
s
s
f
r
a
m
e
w
o
r
k
as
d
escr
ib
ed
in
[
2
1
]
an
d
s
h
o
w
n
in
T
ab
le
1
.
T
ab
le
1
.
Sev
en
q
u
esti
o
n
s
i
n
r
esp
ec
t to
C
y
b
er
Sit
u
atio
n
al
A
war
en
ess
Fra
m
e
w
o
r
k
[
2
1
]
No
.
Qu
e
stio
n
s
Ex
p
lan
a
ti
o
n
s
1
Cu
rre
n
t
sit
u
a
ti
o
n
Is
th
e
re
a
n
y
o
n
g
o
in
g
a
tt
a
c
k
o
n
th
e
s
y
ste
m
?
I
f
th
e
re
a
n
y
,
w
h
a
t
is
th
e
lev
e
l
o
f
se
v
e
rit
y
o
f
th
e
a
tt
a
c
k
a
n
d
w
h
e
re
is t
h
e
a
tt
a
c
k
e
r
lo
c
a
ted
?
2
Im
p
a
c
t
Ho
w
d
o
e
s
th
e
a
tt
a
c
k
a
ff
e
c
t
th
e
o
rg
a
n
iza
ti
o
n
o
r
m
issio
n
?
Ca
n
t
h
e
d
a
m
a
g
e
b
e
a
ss
e
ss
e
d
?
3
Ev
o
lu
ti
o
n
Ho
w
th
e
a
tt
a
c
k
is ev
o
lv
in
g
?
Ca
n
a
ll
th
e
ste
p
o
f
th
e
a
tt
a
c
k
b
e
trac
e
d
?
4
Be
h
a
v
io
u
r
W
h
a
t
a
re
th
e
e
x
p
e
c
ted
b
e
h
a
v
io
u
r
o
f
th
e
a
tt
a
c
k
e
rs?
W
h
a
t
a
re
th
e
ir
stra
teg
ies
in
a
tt
a
c
k
in
g
th
e
s
y
ste
m
?
5
F
o
re
n
sic
W
h
a
t
is
th
e
o
b
jec
ti
v
e
o
f
th
e
a
tt
a
c
k
?
Ho
w
d
id
th
e
a
tt
a
c
k
d
e
p
lo
y
e
d
o
n
th
e
s
y
ste
m
?
6
P
re
d
ictio
n
Ca
n
th
e
f
u
tu
re
a
tt
a
c
k
b
e
p
re
d
icte
d
b
a
se
d
o
n
t
h
e
c
u
rre
n
t
si
tu
a
ti
o
n
?
7
In
f
o
rm
a
ti
o
n
W
h
a
t
so
rt
o
f
in
f
o
r
m
a
ti
o
n
so
u
rc
e
s
c
a
n
b
e
re
li
e
d
o
n
?
Ho
w
is
th
e
q
u
a
li
ty
o
f
th
e
in
f
o
rm
a
ti
o
n
?
4.
SE
CUR
I
T
Y
AUD
I
T
I
n
a
u
d
itin
g
p
r
o
ce
s
s
,
th
e
s
y
s
tem
s
ec
u
r
it
y
o
b
j
ec
tiv
es
an
d
its
i
m
p
le
m
e
n
tatio
n
ar
e
s
cr
ee
n
ed
an
d
t
h
e
n
v
er
if
ied
.
I
n
[
2
]
,
th
e
a
u
t
h
o
r
est
ab
lis
h
ed
t
h
at
t
h
e
s
ec
u
r
it
y
a
u
d
i
ts
ar
e
r
esp
o
n
s
ib
le
in
ev
al
u
ati
n
g
t
h
e
v
u
l
n
er
ab
ilit
ie
s
f
o
u
n
d
in
t
h
e
s
y
s
te
m
s
a
n
d
f
i
n
d
alter
n
ativ
e
s
to
r
ed
u
ce
th
e
ar
e
a
o
f
v
u
ln
er
ab
ilit
ie
s
’
ex
p
o
s
u
r
e.
T
h
e
au
d
it
p
r
o
ce
s
s
in
v
o
l
v
ed
lo
g
f
iles
a
n
al
y
s
is
w
h
er
e
th
e
lo
g
f
i
le
s
ar
e
u
s
e
f
u
l
f
o
r
r
ec
o
r
d
in
g
t
h
e
e
v
en
t
s
a
n
d
ti
m
el
in
es
o
f
th
e
r
u
n
n
in
g
p
r
o
ce
s
s
es.
T
h
e
p
r
o
ce
s
s
es
o
f
s
cr
ee
n
in
g
b
i
g
an
d
lo
n
g
lo
g
f
ile
s
ar
e
v
er
y
ti
m
e
-
co
n
s
u
m
i
n
g
.
T
h
u
s
,
w
it
h
aid
o
f
to
o
l
lik
e
g
e
n
er
al
au
d
it
s
o
f
t
w
ar
e
(
GAS)
is
s
ig
n
i
f
ica
n
t
in
h
elp
i
n
g
s
u
ch
ti
m
e
-
co
n
s
u
m
i
n
g
ta
s
k
s
in
v
o
lv
in
g
r
etr
iev
al
an
d
an
al
y
s
is
o
f
s
i
g
n
i
f
ican
tl
y
b
ig
a
n
d
lar
g
e
d
ata
[
2
2
]
.
T
h
er
e
ar
e
n
u
m
er
o
u
s
n
u
m
b
er
o
f
p
o
p
u
lar
to
o
ls
u
s
ed
i
n
a
u
d
iti
n
g
s
ec
u
r
it
y
an
d
o
n
e
o
f
t
h
e
m
is
L
y
n
i
s
w
h
ich
ca
n
b
e
d
o
w
n
lo
a
d
ed
at
h
ttp
s
://cis
o
f
y
.
co
m
/l
y
n
i
s
/
.
L
y
n
is
is
a
n
Op
e
n
So
u
r
ce
U
n
ix
-
b
ased
s
y
s
te
m
to
o
ls
ai
m
s
i
n
s
ca
n
n
i
n
g
s
ec
u
r
it
y
asp
ec
t
r
ath
er
th
a
n
s
ca
n
n
i
n
g
f
o
r
v
u
l
n
er
ab
ilit
ies.
Fig
u
r
e
2
illu
s
tr
ates t
h
e
in
ter
f
ac
e
o
f
th
e
L
y
n
i
s
au
d
iti
n
g
to
o
ls
.
Fig
u
r
e
2
.
L
y
n
i
s
Secu
r
it
y
Au
d
it
in
g
So
f
t
w
ar
e
5.
K
AL
I
L
I
NUX
SE
T
UP
T
h
is
s
ec
tio
n
d
escr
ib
es
th
e
b
r
ief
h
i
s
to
r
y
o
f
Kali
L
i
n
u
x
,
i
n
s
ta
llin
g
an
d
s
etu
p
Kali
L
in
u
x
o
n
th
e
v
ir
t
u
al
m
ac
h
in
e,
a
n
d
in
s
talli
n
g
a
v
u
l
n
er
ab
le
s
er
v
er
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2502
-
4752
On
th
e
R
ev
iew
a
n
d
S
etu
p
o
f S
e
cu
r
ity
A
u
d
it u
s
in
g
K
a
li Lin
u
x
(
Ted
d
y
S
u
r
ya
Gu
n
a
w
a
n)
55
5
.
1
H
is
t
o
ry
o
f
K
a
li
L
inu
x
Kali
L
i
n
u
x
is
a
Deb
ia
n
-
d
er
i
v
ed
L
i
n
u
x
d
is
tr
ib
u
t
io
n
a
n
d
i
t
i
s
a
f
r
ee
w
ar
e
a
n
d
ca
n
b
e
d
o
wn
lo
ad
ed
f
o
r
f
r
ee
at
h
ttp
://
www
.
k
ali.
o
r
g
a
s
illu
s
tr
ated
in
Fig
u
r
e
3
.
P
r
ev
io
u
s
l
y
,
Kali
L
in
u
x
w
as
k
n
o
w
s
a
s
B
ac
k
T
r
ac
k
w
h
ic
h
m
er
g
ed
t
h
r
ee
d
if
f
er
en
t
L
i
n
u
x
d
is
tr
ib
u
t
io
n
,
i
n
c
lu
d
i
n
g
I
W
HAX,
W
HOP
P
I
X,
an
d
A
u
d
i
to
r
[
6
]
.
Kali
L
i
n
u
x
v
er
s
io
n
1
.
0
w
a
s
r
elea
s
ed
o
n
M
ar
ch
2
0
1
3
.
A
s
o
f
Ma
r
ch
2
0
1
8
,
th
e
la
test
v
er
s
io
n
i
s
2
0
1
8
.
1
an
d
is
co
m
p
atib
le
f
o
r
i3
8
6
,
am
d
6
4
,
ar
m
el
an
d
ar
m
h
f
m
ac
h
i
n
e
ar
ch
itect
u
r
e,
ev
e
n
o
n
R
asp
b
er
r
y
P
i
[
2
3
]
.
Kali
L
in
u
x
h
a
s
n
o
w
m
o
r
e
th
an
6
0
0
p
en
etr
atio
n
test
in
g
t
o
o
ls
,
f
r
ee
,
Fil
es
y
s
te
m
Hier
ar
ch
y
S
tan
d
ar
d
(
FHS)
co
m
p
lian
t
,
an
d
w
id
e
-
r
a
n
g
in
g
w
ir
ele
s
s
d
ev
ice
s
u
p
p
o
r
t
[
2
4
]
.
Kali
L
i
n
u
x
i
s
th
e
m
o
s
t p
o
p
u
lar
p
en
etr
atio
n
test
i
n
g
p
latf
o
r
m
a
s
s
tated
in
[
1
9
]
.
Fig
u
r
e
3
.
Kali
L
i
n
u
x
O
f
f
icial
W
eb
s
ite
Fig
u
r
e
4
.
Kali
L
i
n
u
x
o
n
W
i
n
d
o
w
s
1
0
T
h
e
in
s
tallatio
n
o
f
Kali
L
i
n
u
x
r
eq
u
ir
es
a
m
in
i
m
u
m
2
0
GB
o
f
d
is
k
s
p
ac
e
an
d
1
GB
R
A
M.
K
ali
L
i
n
u
x
ca
n
b
e
i
n
s
tal
led
u
s
i
n
g
t
w
o
w
a
y
s
:
USB
b
o
o
tab
le
d
r
iv
e
o
r
DV
D
d
r
iv
e.
I
n
th
is
p
ap
er
,
w
e
w
i
ll
b
o
o
t K
ali
L
in
u
x
o
n
v
ir
tu
a
l
m
ac
h
i
n
e
a
n
d
attac
k
t
h
e
m
ain
m
ac
h
i
n
e
(
W
in
d
o
w
s
1
0
)
.
A
s
o
f
Feb
r
u
ar
y
2
0
1
8
,
Kali
L
in
u
x
ca
n
b
e
in
s
ta
lled
an
d
u
s
ed
o
n
W
in
d
o
w
s
1
0
d
ir
ec
tl
y
as
p
ar
t
o
f
W
i
n
d
o
w
s
Su
b
s
y
s
te
m
f
o
r
L
i
n
u
x
(
W
SL
)
as
s
h
o
w
n
i
n
Fig
u
r
e
4
.
5
.
2
I
ns
t
a
llin
g
K
a
li L
i
nu
x
o
n Vir
t
ua
l M
a
chine
I
n
o
u
r
r
esear
c
h
,
Kali
L
i
n
u
x
w
i
ll
b
e
in
s
talled
o
n
t
h
e
VM
w
ar
e
v
ir
t
u
al
m
ac
h
in
e.
VM
w
ar
e
is
a
s
o
f
t
w
ar
e
w
h
ic
h
allo
w
ed
a
v
ir
tu
a
l
m
ac
h
in
e
(
w
h
ic
h
u
s
es
s
o
m
e
C
P
Us,
R
A
M
an
d
s
to
r
ag
e
f
r
o
m
t
h
e
m
ain
m
ac
h
i
n
e)
to
b
e
o
p
er
ated
lik
e
n
o
r
m
al
co
m
p
u
t
er
.
T
h
at
m
ea
n
s
t
h
er
e
ar
e
t
w
o
o
p
er
atin
g
s
y
s
te
m
r
u
n
n
i
n
g
s
i
m
u
ltan
eo
u
s
l
y
o
n
a
m
ac
h
in
e.
T
h
er
ef
o
r
e,
in
th
i
s
r
es
ea
r
ch
t
w
o
o
p
er
ati
n
g
s
y
s
te
m
(
W
in
d
o
w
s
1
0
h
o
s
t a
n
d
Ka
li
L
i
n
u
x
v
ir
tu
a
l
m
ac
h
i
n
e)
w
il
l
r
u
n
at
th
e
s
a
m
e
ti
m
e.
Fi
g
u
r
e
5
s
h
o
w
s
t
h
e
co
n
f
i
g
u
r
ed
Kali
L
in
u
x
v
ir
tu
al
m
ac
h
i
n
e,
i
n
w
h
ic
h
it
u
s
e
s
4
C
P
U
C
o
r
es,
2
GB
y
tes
o
f
R
A
M,
an
d
6
0
GB
o
f
h
ar
d
d
r
iv
e.
T
h
e
d
o
w
n
lo
ad
p
ag
e
o
f
Kali
L
i
n
u
x
web
s
ite
o
f
f
er
ed
Kali
L
i
n
u
x
6
4
b
it VM
w
ar
e
VM
,
3
2
b
it VM
w
ar
e
VM
P
A
E
,
6
4
b
it a
n
d
3
2
b
it Vb
o
x
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4752
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci,
Vo
l
.
11
,
No
.
1
,
J
u
ly
201
8
:
51
–
59
56
Fig
u
r
e
5
.
Kali
L
i
n
u
x
o
n
VM
war
e
Vir
tu
al
Ma
ch
i
n
e
Kali
L
i
n
u
x
co
n
s
is
ts
o
f
h
u
n
d
r
ed
s
o
f
p
r
e
-
b
u
ilt
to
o
ls
.
T
h
e
to
o
ls
ar
e
d
iv
id
ed
in
to
s
ec
tio
n
s
to
its
f
u
n
ctio
n
alit
y
an
d
u
t
ilit
ie
s
.
E
ac
h
s
ec
tio
n
ca
r
r
ies
o
u
t
d
i
f
f
er
e
n
t
task
b
u
t
w
it
h
s
a
m
e
o
b
j
ec
tiv
e;
to
d
o
p
en
etr
atio
n
test
i
n
g
.
T
h
e
f
o
llo
w
i
n
g
s
ar
e
th
e
s
ec
tio
n
s
t
h
e
to
o
l
s
d
iv
id
ed
in
to
[
6
]
:
I
n
fo
r
ma
tio
n
g
a
th
erin
g
: I
m
p
o
r
tan
t to
o
ls
to
co
llect
in
f
o
r
m
atio
n
ab
o
u
t th
e
tar
g
et
V
u
ln
era
b
ilit
y
a
n
a
lysi
s
: T
o
o
ls
f
o
r
s
ca
n
n
i
n
g
w
ea
k
n
es
s
in
t
h
e
s
y
s
te
m
Wir
ele
s
s
a
tta
ck
: T
o
o
ls
ca
r
r
y
o
u
t a
ttac
k
o
n
w
ir
eles
s
p
r
o
to
co
l
W
eb
a
p
p
lica
tio
n
: U
s
ed
to
attac
k
W
eb
Sit
e,
W
eb
Ser
v
er
an
d
W
eb
A
p
p
licatio
n
.
S
n
iffi
n
g
a
n
d
s
p
o
o
fin
g
:
T
o
o
ls
u
s
ed
to
m
o
n
ito
r
an
d
ca
p
tu
r
e
th
e
n
et
w
o
r
k
tr
a
f
f
ic
an
d
m
an
ip
u
lati
n
g
it
E
xp
lo
ita
tio
n
to
o
ls
: T
o
o
ls
u
s
ed
to
id
en
tify
t
h
e
v
u
l
n
er
ab
ilit
ies i
n
a
s
y
s
te
m
F
o
r
en
s
ic
to
o
ls
:
Fo
cu
s
ed
o
n
m
o
n
ito
r
i
n
g
a
n
d
an
al
y
zin
g
s
y
s
te
m
’
s
n
et
w
o
r
k
tr
a
f
f
ic
an
d
p
r
o
g
r
a
m
.
S
tr
ess
te
s
tin
g
:
T
o
o
ls
u
s
ed
to
m
ea
s
u
r
e
h
o
w
m
u
c
h
a
s
y
s
te
m
c
an
h
a
n
d
le
a
h
ea
v
y
lo
ad
o
f
n
et
w
o
r
k
tr
a
f
f
ic
an
d
in
f
o
r
m
atio
n
(
DDo
S a
ttack
)
.
P
a
s
s
w
o
r
d
a
tta
ck
s
:
Dea
l
w
it
h
b
r
u
te
f
o
r
ce
o
f
a
s
y
s
te
m
;
id
e
n
ti
f
y
in
g
,
f
i
n
d
i
n
g
a
n
d
cr
ac
k
in
g
p
ass
w
o
r
d
o
f
a
s
y
s
te
m
Ma
in
ta
in
in
g
a
cc
ess
: U
s
ed
to
k
ee
p
th
e
ac
ce
s
s
o
n
t
h
e
s
y
s
te
m
t
h
at
h
a
s
b
ee
n
ex
p
lo
ited
i.e
.
b
ac
k
d
o
o
r
.
R
ev
ers
e
en
g
in
ee
r
in
g
: I
d
en
tify
h
o
w
a
s
y
s
te
m
is
p
r
o
d
u
ce
d
s
o
it
m
ig
h
t b
e
d
u
p
licated
o
r
ch
an
g
ed
Ha
r
d
w
a
r
e
h
a
ck
in
g
:
Fo
cu
s
ed
o
n
g
ain
in
g
ac
ce
s
s
o
v
er
s
m
all
elec
tr
o
n
ic
d
ev
ices
li
k
e
a
n
d
r
o
id
an
d
A
r
d
u
i
n
o
.
R
ep
o
r
tin
g
to
o
ls
:
Us
ed
f
o
r
p
o
s
t
p
en
etr
atio
n
test
in
g
;
g
a
th
er
in
f
o
r
m
atio
n
an
d
p
r
o
v
id
e
p
r
o
p
er
d
o
cu
m
en
tatio
n
to
r
ep
o
r
t o
n
th
e
o
r
g
an
izatio
n
Ho
w
e
v
er
,
th
er
e
ar
e
s
ti
ll
lo
t
o
f
Op
en
-
So
u
r
ce
to
o
ls
t
h
at
ar
e
a
v
ailab
le
o
n
lin
e
an
d
ca
n
b
e
d
o
w
n
lo
ad
ed
an
d
in
s
talled
o
n
t
h
e
Kali
L
in
u
x
s
y
s
te
m
.
Mo
s
t
o
f
th
e
m
ar
e
ac
ce
s
s
ib
le
i
n
GitH
u
b
s
ite.
C
o
m
m
a
n
d
g
it
clo
n
e
ex
ec
u
te
i
n
t
h
e
Kali
L
i
n
u
x
ter
m
in
al
is
u
s
ed
to
d
o
w
n
lo
ad
th
e
to
o
ls
f
r
o
m
t
h
e
GitH
u
b
.
5
.
3
I
ns
t
a
llin
g
a
Vuln
er
a
b
le
Serv
er
T
o
ex
p
er
im
en
t
w
it
h
p
en
etr
ati
o
n
test
i
n
g
f
o
llo
w
i
n
g
t
h
e
eth
ic
al
h
ac
k
in
g
g
u
id
elin
e,
w
e
m
u
s
t
d
o
all
th
e
p
en
etr
atio
n
test
i
n
g
o
n
o
u
r
o
w
n
en
v
ir
o
n
m
en
t.
T
h
at
b
ee
n
s
aid
,
w
e
m
u
s
t
n
o
t
d
o
p
en
etr
atio
n
test
i
n
g
o
n
p
r
iv
ate
w
eb
s
er
v
er
o
r
p
r
iv
ate
f
ir
e
w
a
ll
m
ac
h
in
e.
Hen
ce
,
w
e
n
e
ed
t
o
s
etu
p
a
s
i
m
p
le
w
eb
s
er
v
er
f
o
r
th
e
p
u
r
p
o
s
e
o
f
p
en
etr
atio
n
test
in
g
.
A
s
o
f
t
w
ar
e
ca
lled
XA
MP
P
s
er
v
er
is
i
n
s
talled
o
n
th
e
m
ai
n
m
ac
h
i
n
e
(
W
in
d
o
w
s
1
0
)
w
h
ic
h
is
s
i
m
p
le
a
n
d
u
s
e
f
u
l.
XA
MP
P
s
tan
d
s
f
o
r
X
–
c
r
o
s
s
p
latf
o
r
m
,
A
–
ap
ac
h
e
s
er
v
er
,
M
–
Ma
r
ia
DB
,
P
–
P
H
P
,
a
nd
P
–
P
E
R
L
,
as sh
o
w
n
i
n
Fi
g
u
r
e
6
(
a)
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2502
-
4752
On
th
e
R
ev
iew
a
n
d
S
etu
p
o
f S
e
cu
r
ity
A
u
d
it u
s
in
g
K
a
li Lin
u
x
(
Ted
d
y
S
u
r
ya
Gu
n
a
w
a
n)
57
(
a)
XA
MP
P
C
o
n
tr
o
l P
an
el
(
b
)
Settin
g
DVW
A
Sec
u
r
it
y
L
ev
el
Fig
u
r
e
6
.
XA
MP
P
C
o
n
tr
o
l P
an
el
an
d
Sett
in
g
DVW
A
Sec
u
r
i
t
y
L
ev
el
B
y
co
m
p
letin
g
t
h
e
i
n
s
tal
latio
n
o
f
X
A
MP
P
s
er
v
er
,
w
e
ca
n
n
o
w
p
r
o
ce
ed
to
cr
ea
tin
g
o
u
r
o
w
n
w
eb
s
it
e
to
b
e
attac
k
ed
f
o
r
.
Ho
w
ev
er
,
t
h
er
e
is
a
to
o
l
ca
lled
Da
m
n
V
u
ln
er
ab
le
W
eb
A
p
p
licatio
n
(
D
VW
A
)
th
a
t
s
a
v
e
u
s
f
r
o
m
s
p
en
d
i
n
g
ti
m
e
o
n
cr
ea
ti
n
g
r
ea
l
w
eb
s
i
te
a
n
d
w
eb
s
er
v
e
r
.
XA
MP
P
is
co
m
p
u
l
s
o
r
y
in
o
r
d
er
f
o
r
DVW
A
to
w
o
r
k
.
DVW
A
i
s
an
o
p
en
s
o
u
r
ce
to
o
ls
w
h
ic
h
ca
n
b
e
e
asil
y
d
o
w
n
lo
ad
ed
f
r
o
m
h
ttp
:
//
www
.
d
v
w
a.
co
.
u
k
/
.
DVW
A
p
r
o
v
id
es
t
h
e
e
n
v
ir
o
n
m
en
t
f
o
r
p
en
etr
atio
n
test
in
g
f
o
r
th
e
m
o
s
t
p
o
p
u
lar
w
eb
a
ttac
k
li
k
e
SQ
L
i
n
j
ec
tio
n
,
XSS
a
n
d
B
r
u
t
e
Fo
r
ce
.
T
h
e
m
o
s
t
in
ter
e
s
ti
n
g
p
ar
t
o
f
t
h
e
DV
W
A
i
s
t
h
at
t
h
e
s
ec
u
r
it
y
le
v
el
o
f
th
e
w
eb
s
ite
a
n
d
w
eb
s
er
v
er
ca
n
b
e
m
o
d
if
ied
b
ased
o
n
t
h
e
i
n
ten
d
ed
e
x
p
er
i
m
en
t.
I
t
ca
n
b
e
s
et
to
f
o
u
r
le
v
e
l
o
f
s
ec
u
r
it
y
:
lo
w
,
m
ed
iu
m
,
h
ig
h
an
d
i
m
p
o
s
s
ib
le
as
illu
s
tr
ated
in
Fi
g
u
r
e
7
(
b
)
.
I
n
th
is
r
esear
ch
,
w
e
s
et
t
h
e
s
ec
u
r
it
y
le
v
el
to
lo
w
,
i
n
w
h
ic
h
it is
co
m
p
le
tel
y
v
u
ln
er
a
b
le
an
d
h
as n
o
t
s
ec
u
r
it
y
m
ea
s
u
r
es a
t a
ll.
6.
CO
NCLU
SI
O
NS A
ND
F
UT
URE WO
RK
S
T
h
is
p
ap
er
h
as p
r
ese
n
ted
a
r
ev
ie
w
o
f
p
e
n
etr
atio
n
test
i
n
g
,
s
ec
u
r
it
y
an
al
y
s
is
,
a
n
d
s
ec
u
r
it
y
a
u
d
it.
On
t
h
e
p
en
etr
atio
n
test
i
n
g
,
w
e
r
e
v
ie
wed
th
e
m
o
s
t
p
o
p
u
lar
tech
n
iq
u
e
s
in
cl
u
d
in
g
SQ
L
i,
XS
S,
L
FI,
R
FI,
DDo
S,
MI
T
M
,
an
d
ze
r
o
-
d
a
y
v
u
l
n
er
ab
ilit
ies.
On
t
h
e
o
t
h
er
h
an
d
,
Ka
li
L
i
n
u
x
is
t
h
e
m
o
s
t
p
o
p
u
lar
p
e
n
e
tr
atio
n
te
s
tin
g
an
d
s
ec
u
r
it
y
a
u
d
it
p
lat
f
o
r
m
w
ith
ad
v
an
ce
d
to
o
ls
to
d
etec
t
an
y
v
u
l
n
er
ab
ilit
ie
s
u
n
co
v
er
ed
in
t
h
e
tar
g
et
m
ac
h
in
e.
B
r
ief
h
i
s
to
r
y
o
f
Kal
i
L
i
n
u
x
h
a
s
b
ee
n
p
r
ese
n
ted
,
alo
n
g
w
i
th
t
h
e
s
e
tu
p
a
n
d
i
n
s
tal
latio
n
.
Fo
r
t
e
s
tin
g
p
u
r
p
o
s
e,
w
e
h
av
e
in
s
talled
an
d
co
n
f
i
g
u
r
e
v
u
l
n
er
ab
le
s
er
v
er
.
Fu
r
t
h
er
r
es
ea
r
ch
in
cl
u
d
i
n
g
s
i
m
u
lated
att
ac
k
s
to
v
u
ln
er
ab
le
s
er
v
er
o
n
b
o
th
w
eb
an
d
f
ir
e
w
a
ll s
y
s
te
m
.
ACK
NO
WL
E
D
G
E
M
E
NT
T
h
e
au
th
o
r
s
w
o
u
ld
li
k
e
to
e
x
p
r
ess
th
eir
g
r
atit
u
d
e
to
t
h
e
M
ala
y
s
ia
n
Mi
n
i
s
tr
y
o
f
Hi
g
h
er
E
d
u
ca
tio
n
(
MO
HE
)
,
w
h
ic
h
h
a
s
p
r
o
v
id
ed
f
u
n
d
in
g
f
o
r
th
e
r
e
s
ea
r
ch
t
h
r
o
u
g
h
th
e
Fu
n
d
a
m
en
ta
l
R
e
s
e
ar
ch
Gr
an
t
Sch
e
m
e,
FR
GS1
4
-
139
-
0380.
RE
F
E
R
E
NC
E
S
[1
]
P
.
W
.
S
in
g
e
r
a
n
d
A
.
F
ried
m
a
n
,
Cy
b
e
rs
e
c
u
rity: W
h
a
t
e
v
e
ry
o
n
e
n
e
e
d
s to
k
n
o
w
,
Ox
f
o
rd
Un
iv
e
rsity
P
re
ss
,
2
0
1
4
.
[2
]
R.
R.
Bro
o
k
s,
In
tr
o
d
u
c
ti
o
n
t
o
Co
mp
u
ter
a
n
d
Ne
tw
o
rk
S
e
c
u
rity: N
a
v
ig
a
ti
n
g
S
h
a
d
e
s
o
f
Gr
a
y
,
CRC
P
r
e
ss
,
2
0
1
3
.
[3
]
J.
A
n
n
u
z
z
i
Jr,
L
.
Da
rc
e
y
,
a
n
d
S
.
Co
n
d
e
r,
I
n
tro
d
u
c
ti
o
n
to
An
d
ro
i
d
a
p
p
li
c
a
ti
o
n
d
e
v
e
lo
p
me
n
t:
A
n
d
r
o
id
e
ss
e
n
ti
a
ls
,
P
e
a
rso
n
Ed
u
c
a
ti
o
n
,
2
0
1
4
.
[4
]
D.
J.
Tan
,
T
.
-
W
.
Ch
u
a
,
a
n
d
V.
L
.
T
h
in
g
,
"
S
e
c
u
rin
g
a
n
d
ro
id
:
a
su
rv
e
y
,
ta
x
o
n
o
m
y
,
a
n
d
c
h
a
ll
e
n
g
e
s,"
ACM
Co
mp
u
t
in
g
S
u
rv
e
y
s (
CS
UR)
,
v
o
l.
4
7
,
p
p
.
5
8
,
2
0
1
5
.
[5
]
B.
Ke
sle
r,
"
T
h
e
v
u
ln
e
ra
b
il
it
y
o
f
n
u
c
lea
r
f
a
c
il
it
ies
to
c
y
b
e
r
a
tt
a
c
k
;
stra
t
e
g
i
c
in
sig
h
ts:
S
p
rin
g
2
0
1
0
,
"
S
tra
teg
ic
In
sig
h
ts,
S
p
rin
g
2
0
1
1
,
2
0
1
1
.
[6
]
L
.
A
ll
e
n
,
T
.
He
ri
y
a
n
to
,
a
n
d
S
.
A
li
,
Ka
li
L
in
u
x
–
Assu
ri
n
g
se
c
u
rity
b
y
p
e
n
e
tra
ti
o
n
tes
ti
n
g
,
P
a
c
k
t
P
u
b
li
s
h
in
g
L
td
,
2
0
1
4
.
[7
]
J.
M
u
n
iz,
W
e
b
Pen
e
tr
a
ti
o
n
T
e
sti
n
g
wit
h
Ka
l
i
L
i
n
u
x
,
P
a
c
k
t
P
u
b
li
s
h
i
n
g
L
td
,
2
0
1
3
.
[8
]
R.
S
.
P
a
tel
,
Ka
l
i
L
i
n
u
x
S
o
c
i
a
l
E
n
g
in
e
e
rin
g
,
P
a
c
k
t
P
u
b
li
sh
i
n
g
L
td
,
2
0
1
3
.
[9
]
R.
W
.
Be
g
g
s,
M
a
ste
rin
g
Ka
li
L
in
u
x
fo
r
a
d
v
a
n
c
e
d
p
e
n
e
tra
ti
o
n
tes
ti
n
g
,
P
a
c
k
t
P
u
b
li
sh
i
n
g
L
td
,
2
0
1
4
.
[1
0
]
C.
P
.
S
c
h
u
l
tz an
d
B
.
P
e
rc
iac
c
a
n
te,
Ka
li
L
in
u
x
Co
o
k
b
o
o
k
,
P
a
c
k
t
P
u
b
l
ish
in
g
L
td
,
2
0
1
7
.
[1
1
]
P
.
S
.
S
h
in
d
e
a
n
d
S
.
B.
A
rd
h
a
p
u
rk
a
r,
"
C
y
b
e
r
se
c
u
rit
y
a
n
a
l
y
sis
u
sin
g
v
u
ln
e
ra
b
il
it
y
a
ss
e
ss
m
e
n
t
a
n
d
p
e
n
e
tratio
n
tes
ti
n
g
,
"
in
Fu
tu
ristic
T
re
n
d
s
i
n
Res
e
a
rc
h
a
n
d
In
n
o
v
a
ti
o
n
fo
r
S
o
c
ia
l
W
e
lf
a
re
(
S
ta
rtu
p
Co
n
c
la
v
e
),
W
o
rld
Co
n
fer
e
n
c
e
o
n
,
p
p
.
1
-
5
,
2
0
1
6
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4752
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci,
Vo
l
.
11
,
No
.
1
,
J
u
ly
201
8
:
51
–
59
58
[1
2
]
R.
P
.
Ka
ru
p
a
rth
i
a
n
d
B.
Zh
o
u
,
"
E
n
h
a
n
c
e
d
A
p
p
r
o
a
c
h
t
o
De
tec
ti
o
n
o
f
S
QL
I
n
jec
ti
o
n
At
t
a
c
k
,
"
in
M
a
c
h
in
e
L
e
a
rn
in
g
a
n
d
A
p
p
li
c
a
ti
o
n
s (ICM
L
A
),
2
0
1
6
1
5
t
h
IE
EE
In
tern
a
ti
o
n
a
l
Co
n
f
e
re
n
c
e
o
n
,
p
p
.
4
6
6
-
4
6
9
,
2
0
1
6
.
[1
3
]
M
.
D.
Am
b
e
d
k
a
r,
N.
S
.
Am
b
e
d
k
a
r,
a
n
d
R.
S
.
Ra
w
,
"
A
c
o
mp
re
h
e
n
siv
e
in
sp
e
c
ti
o
n
o
f
c
ro
ss
site
sc
rip
ti
n
g
a
tt
a
c
k
,
"
in
Co
m
p
u
ti
n
g
,
Co
m
m
u
n
ica
ti
o
n
a
n
d
A
u
to
m
a
ti
o
n
(ICCCA
),
2
0
1
6
I
n
ter
n
a
ti
o
n
a
l
Co
n
f
e
re
n
c
e
o
n
,
p
p
.
4
9
7
-
5
0
2
,
2
0
1
6
.
[1
4
]
A
.
Be
g
u
m
,
M
.
M
.
Ha
ss
a
n
,
T
.
Bh
u
iy
a
n
,
a
n
d
M
.
H.
S
h
a
rif
,
"
RF
I
a
n
d
S
QL
i
b
a
se
d
lo
c
a
l
f
il
e
in
c
lu
sio
n
v
u
ln
e
ra
b
il
it
ies
in
w
e
b
a
p
p
l
ica
ti
o
n
s
o
f
Ba
n
g
lad
e
sh
,
"
in
Co
mp
u
t
a
ti
o
n
a
l
In
telli
g
e
n
c
e
(
IW
CI),
In
ter
n
a
ti
o
n
a
l
W
o
rk
sh
o
p
o
n
,
p
p
.
2
1
-
2
5
,
2
0
1
6
.
[1
5
]
S
.
T
.
Zarg
a
r,
J.
Jo
sh
i,
a
n
d
D.
Ti
p
p
e
r,
"
A
su
rv
e
y
o
f
d
e
f
e
n
se
m
e
c
h
a
n
ism
s
a
g
a
in
st
d
istri
b
u
ted
d
e
n
ial
o
f
s
e
rv
ic
e
(DD
o
S
)
f
lo
o
d
in
g
a
tt
a
c
k
s,"
IEE
E
c
o
mm
u
n
ic
a
ti
o
n
s su
rv
e
y
s
&
tu
to
ria
l
s
,
v
o
l.
1
5
,
p
p
.
2
0
4
6
-
2
0
6
9
,
2
0
1
3
.
[1
6
]
O.
S
.
Na
g
e
sh
,
T
.
Ku
m
a
r,
a
n
d
V
.
R.
V
e
d
u
la,
"
A
S
u
rv
e
y
o
n
S
e
c
u
rit
y
As
p
e
c
ts
o
f
S
e
rv
e
r
V
irt
u
a
li
z
a
ti
o
n
i
n
Clo
u
d
Co
m
p
u
ti
n
g
,
"
In
ter
n
a
ti
o
n
a
l
J
o
u
r
n
a
l
o
f
El
e
c
trica
l
a
n
d
C
o
mp
u
ter
En
g
in
e
e
rin
g
,
v
o
l.
7
,
p
p
.
1
3
2
6
,
2
0
1
7
.
[1
7
]
M
.
Co
n
ti
,
N.
Dra
g
o
n
i
,
a
n
d
V
.
L
e
s
y
k
,
"
A
su
rv
e
y
o
f
m
a
n
in
t
h
e
m
id
d
le
a
tt
a
c
k
s,"
IEE
E
Co
mm
u
n
ica
ti
o
n
s
S
u
rv
e
y
s
&
T
u
to
ri
a
ls
,
v
o
l.
1
8
,
p
p
.
2
0
2
7
-
2
0
5
1
,
2
0
1
6
.
[1
8
]
M
.
De
n
is,
C
.
Zen
a
,
a
n
d
T
.
Ha
y
a
j
n
e
h
,
"
P
e
n
e
trati
o
n
tes
ti
n
g
:
Co
n
c
e
p
ts,
a
tt
a
c
k
m
e
th
o
d
s,
a
n
d
d
e
f
e
n
se
s
trate
g
ies
,
"
in
S
y
ste
ms
,
Ap
p
l
ica
ti
o
n
s
a
n
d
T
e
c
h
n
o
lo
g
y
Co
n
fer
e
n
c
e
(
L
IS
AT
)
,
2
0
1
6
I
EE
E
L
o
n
g
Isla
n
d
,
p
p
.
1
-
6
,
2
0
1
6
.
[1
9
]
P
.
En
g
e
b
re
tso
n
,
T
h
e
b
a
sic
s o
f
h
a
c
k
in
g
a
n
d
p
e
n
e
tr
a
ti
o
n
tes
ti
n
g
:
e
th
i
c
a
l
h
a
c
k
in
g
a
n
d
p
e
n
e
tra
ti
o
n
tes
ti
n
g
ma
d
e
e
a
sy
,
El
se
v
ier,
2
0
1
3
.
[2
0
]
K.
Zetter,
Co
u
n
t
d
o
w
n
to
Z
e
ro
D
a
y
:
S
tu
x
n
e
t
a
n
d
t
h
e
la
u
n
c
h
o
f
t
h
e
wo
rld
'
s
fi
rs
t
d
ig
it
a
l
we
a
p
o
n
,
Bro
a
d
w
a
y
b
o
o
k
s,
2
0
1
4
.
[2
1
]
A
.
Ko
tt
,
C.
W
a
n
g
,
a
n
d
R
.
F
.
Erb
a
c
h
e
r,
Cy
b
e
r d
e
fen
se
a
n
d
si
tu
a
ti
o
n
a
l
a
w
a
re
n
e
ss
,
v
o
l.
6
2
,
S
p
rin
g
e
r,
2
0
1
5
.
[2
2
]
N.
M
a
h
z
a
n
a
n
d
A
.
Ly
m
e
r,
"
E
x
a
m
in
in
g
th
e
a
d
o
p
ti
o
n
o
f
c
o
m
p
u
ter
-
a
ss
isted
a
u
d
it
to
o
ls
a
n
d
tec
h
n
iq
u
e
s:
Ca
se
s
o
f
g
e
n
e
ra
li
z
e
d
a
u
d
it
so
f
tw
a
re
u
se
b
y
in
tern
a
l
a
u
d
it
o
rs,"
M
a
n
a
g
e
ria
l
Au
d
it
in
g
J
o
u
rn
a
l
,
v
o
l.
2
9
,
p
p
.
3
2
7
-
3
4
9
,
2
0
1
4
.
[
2
3
]
N.
B.
A
l
Ba
rg
h
u
th
i,
M
.
S
a
le
h
,
S
.
A
lsu
w
a
id
i,
a
n
d
S
.
A
lh
a
m
m
a
d
i,
"
Ev
a
lu
a
ti
o
n
o
f
p
o
rtab
le
p
e
n
e
trati
o
n
tes
ti
n
g
o
n
s
m
a
rt
c
it
ies
a
p
p
li
c
a
ti
o
n
s
u
sin
g
Ra
sp
b
e
rry
P
i
III
,
"
in
HCT
I
n
fo
rm
a
ti
o
n
T
e
c
h
n
o
lo
g
y
T
re
n
d
s
(IT
T
),
2
0
1
7
F
o
u
rt
h
,
p
p
.
67
-
7
2
,
2
0
1
7
.
[2
4
]
Ka
li
L
in
u
x
,
"
W
h
a
t
is
Ka
li
L
in
u
x
?
,
"
[
h
tt
p
s:
//
d
o
c
s.k
a
li
.
o
rg
/i
n
tr
o
d
u
c
ti
o
n
/w
h
a
t
-
is
-
k
a
li
-
li
n
u
x
]
,
Re
tri
e
v
e
d
o
n
:
M
a
rc
h
2
0
1
8
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2502
-
4752
On
th
e
R
ev
iew
a
n
d
S
etu
p
o
f S
e
cu
r
ity
A
u
d
it u
s
in
g
K
a
li Lin
u
x
(
Ted
d
y
S
u
r
ya
Gu
n
a
w
a
n)
59
B
I
O
G
RAP
H
Y
O
F
AUTHO
RS
Te
d
d
y
S
u
r
y
a
G
u
n
a
w
a
n
re
c
e
iv
e
d
h
is BE
n
g
d
e
g
re
e
in
El
e
c
tri
c
a
l
En
g
in
e
e
rin
g
w
it
h
c
u
m
lau
d
e
a
wa
rd
f
ro
m
In
stit
u
t
T
e
k
n
o
lo
g
i
Ba
n
d
u
n
g
(IT
B),
In
d
o
n
e
sia
i
n
1
9
9
8
.
He
o
b
tain
e
d
h
is
M
.
E
n
g
d
e
g
re
e
in
2
0
0
1
f
ro
m
th
e
S
c
h
o
o
l
o
f
Co
m
p
u
ter E
n
g
in
e
e
ri
n
g
a
t
Na
n
y
a
n
g
T
e
c
h
n
o
lo
g
ica
l
Un
iv
e
rsity
,
S
in
g
a
p
o
re
,
a
n
d
P
h
D
d
e
g
re
e
in
2
0
0
7
f
ro
m
th
e
S
c
h
o
o
l
o
f
El
e
c
tri
c
a
l
En
g
in
e
e
rin
g
a
n
d
T
e
le
c
o
m
m
u
n
ica
ti
o
n
s,
T
h
e
Un
i
v
e
rsity
o
f
Ne
w
S
o
u
th
W
a
les
,
A
u
stra
li
a
.
His res
e
a
rc
h
in
tere
sts a
re
in
sp
e
e
c
h
a
n
d
a
u
d
io
p
r
o
c
e
ss
in
g
,
b
i
o
m
e
d
ica
l
sig
n
a
l
p
ro
c
e
ss
in
g
a
n
d
in
s
tru
m
e
n
tatio
n
,
im
a
g
e
a
n
d
v
id
e
o
p
ro
c
e
ss
in
g
,
p
a
ra
ll
e
l
c
o
m
p
u
ti
n
g
,
a
n
d
i
n
f
o
rm
a
ti
o
n
se
c
u
rit
y
.
He
is cu
rre
n
tl
y
a
n
IEE
E
S
e
n
i
o
r
M
e
m
b
e
r
(sin
c
e
2
0
1
2
),
w
a
s c
h
a
ir
m
a
n
o
f
IE
EE
In
str
u
m
e
n
tatio
n
a
n
d
M
e
a
su
re
m
e
n
t
S
o
c
iety
–
M
a
lay
sia
S
e
c
ti
o
n
(2
0
1
3
a
n
d
2
0
1
4
),
A
ss
o
c
iate
P
ro
f
e
ss
o
r
(sin
c
e
2
0
1
2
),
He
a
d
o
f
De
p
a
rtme
n
t
(2
0
1
5
-
2
0
1
6
)
a
t
De
p
a
rtme
n
t
o
f
El
e
c
tri
c
a
l
a
n
d
Co
m
p
u
ter E
n
g
in
e
e
rin
g
,
a
n
d
He
a
d
o
f
P
r
o
g
ra
m
m
e
A
c
c
r
e
d
it
a
ti
o
n
a
n
d
Qu
a
li
ty
A
ss
u
ra
n
c
e
f
o
r
F
a
c
u
lt
y
o
f
En
g
in
e
e
rin
g
(sin
c
e
2
0
1
7
),
I
n
tern
a
ti
o
n
a
l
Isla
m
ic Un
iv
e
rsit
y
M
a
la
y
sia
.
He
is Ch
a
rtere
d
En
g
in
e
e
r
(IE
T
,
UK
)
a
n
d
In
si
n
y
u
r
P
r
o
f
e
sio
n
a
l
M
a
d
y
a
(P
II,
In
d
o
n
e
sia
)
sin
c
e
2
0
1
6
.
M
u
h
a
m
m
a
d
K
a
ss
i
m
Li
m
h
a
s c
o
m
p
lete
d
h
is B.
En
g
.
(H
o
n
s)
d
e
g
re
e
in
C
o
m
p
u
ter E
n
g
in
e
e
rin
g
f
ro
m
In
tern
a
ti
o
n
a
l
Isla
m
ic Un
iv
e
r
sity
M
a
la
y
sia
(IIUM
)
in
2
0
1
8
.
Hi
s res
e
a
rc
h
in
tere
sts a
re
in
c
o
m
p
u
ter se
c
u
rit
y
,
v
u
ln
e
ra
b
il
it
y
a
ss
e
ss
m
e
n
t,
p
e
n
e
trati
o
n
tes
ti
n
g
,
a
n
d
o
p
e
n
s
o
u
rc
e
se
c
u
rit
y
a
n
a
l
y
sis
.
Nu
r
u
l
Fa
r
iz
a
Z
u
l
k
u
r
n
a
i
n
re
c
e
iv
e
d
th
e
B.
E
n
g
.
d
e
g
re
e
in
C
o
m
p
u
ter an
d
I
n
f
o
rm
a
ti
o
n
e
n
g
in
e
e
rin
g
f
ro
m
In
tern
a
ti
o
n
a
l
Isla
m
ic Un
iv
e
r
sity
M
a
la
y
sia
,
in
2
0
0
2
.
S
h
e
o
b
tain
e
d
h
e
r
M
S
c
in
S
y
ste
m
s
En
g
in
e
e
rin
g
w
it
h
IT
A
p
p
li
c
a
ti
o
n
s
f
ro
m
Ca
rd
iff
Un
iv
e
rsit
y
in
2
0
0
5
a
n
d
P
h
.
D.
d
e
g
re
e
s in
Co
m
p
u
ter
S
c
ie
n
c
e
(Da
ta M
in
in
g
)
f
ro
m
th
e
Un
iv
e
rsit
y
o
f
M
a
n
c
h
e
ste
r
in
2
0
1
2
.
In
2
0
0
2
,
sh
e
j
o
in
e
d
th
e
De
p
a
rtme
n
t
o
f
El
e
c
tri
c
a
l
a
n
d
Co
m
p
u
ter E
n
g
in
e
e
rin
g
,
In
ter
n
a
ti
o
n
a
l
Isla
m
i
c
Un
iv
e
rsit
y
M
a
la
y
si
a
,
a
s
a
L
e
c
tu
re
r.
S
in
c
e
De
c
e
m
b
e
r
2
0
1
2
,
sh
e
is cu
rre
n
tl
y
w
it
h
th
e
De
p
a
rt
m
e
n
t
o
f
E
lec
tri
c
a
l
o
f
Co
m
p
u
ter
En
g
in
e
e
rin
g
,
In
tern
a
ti
o
n
a
l
Isla
m
ic Un
iv
e
rsit
y
M
a
la
y
sia
,
a
s a
n
A
ss
i
sta
n
t
P
ro
f
e
ss
o
r.
He
r
c
u
rre
n
t
re
se
a
rc
h
in
tere
sts in
c
lu
d
e
d
a
ta m
i
n
in
g
,
i
n
f
o
rm
a
ti
o
n
se
c
u
rit
y
,
n
e
u
ra
l
n
e
tw
o
rk
s,
m
a
c
h
in
e
lea
rn
in
g
,
a
n
d
Io
T
.
M
ira
K
a
r
ti
w
i
c
o
m
p
lete
d
h
e
r
st
u
d
ies
a
t
th
e
Un
iv
e
rsity
o
f
W
o
ll
o
n
g
o
n
g
,
A
u
stra
li
a
re
su
lt
in
g
in
th
e
f
o
ll
o
w
in
g
d
e
g
re
e
s b
e
in
g
c
o
n
f
e
rre
d
:
Ba
c
h
e
lo
r
o
f
Co
m
m
e
r
c
e
in
Bu
si
n
e
ss
In
f
o
rm
a
ti
o
n
S
y
ste
m
s,
M
a
ste
r
in
In
f
o
rm
a
ti
o
n
S
y
ste
m
s in
2
0
0
1
a
n
d
h
e
r
Do
c
t
o
r
o
f
P
h
il
o
s
o
p
h
y
in
2
0
0
9
.
S
h
e
is cu
rre
n
tl
y
a
n
A
s
so
c
iate
P
ro
f
e
ss
o
r
in
De
p
a
rtm
e
n
t
o
f
In
f
o
rm
a
ti
o
n
S
y
ste
m
s,
Ku
ll
iy
y
a
h
o
f
In
f
o
rm
a
ti
o
n
a
n
d
Co
m
m
u
n
ica
ti
o
n
T
e
c
h
n
o
l
o
g
y
,
In
tern
a
ti
o
n
a
l
Isla
m
ic Un
iv
e
rsit
y
M
a
la
y
sia
.
He
r
re
se
a
rc
h
in
tere
sts
in
c
lu
d
e
e
lec
tro
n
ic co
m
m
e
rc
e
,
d
a
ta m
in
in
g
,
e
-
h
e
a
lt
h
a
n
d
m
o
b
il
e
a
p
p
li
c
a
ti
o
n
s d
e
v
e
lo
p
m
e
n
t.
Evaluation Warning : The document was created with Spire.PDF for Python.