Vulnerability Analysis in Server Systems

  • 1 National Military University, “AADCIS” Faculty, Shumen, Bulgaria


Nowadays with the advancement of technologies and the direct impact of Covid-19 on business processes, more and more services are provided to the end users electronically. This is a convenient method for both providers of these services and consumers, but this trend also leads to several vulnerabilities in the protection of computer server systems and networks, through which communication between the customer and the provider is carried out at a technological level. Impact on computer or network systems is presented.



  1. Ben Clark, Red Team field manual, 2014
  2. Chris Anley, Advanced SQL Injection in SQL Server Applications, 2002
  3. EC-Council, Ethical Hacking and Countermeasures: Attack Phases, 2016
  4. Aman Singh, Analysis of DoS Attacks, Consequences and Proposed Defence Mechanisms, 2017
  5. Justin Clarke, SQL Injection Attacks and Defence, 2012
  6. Raphael Hertzog, Jim O’Gorman, Kali Linux Revealed: Mastering the Penetration Testing Distribution, 2017
  7. Georgia Weidman, Penetration Testing: A Hands-On Introduction to Hacking, 2014
  8. Gerald Carter, Jay Ts, Robert Eckstein, Using Samba: A File and Print

Article full text

Download PDF