Some ethical hacking possibilities in Kali Linux environment

  • Petar Cisar University of Criminal Investigation and Police Studies
  • Robert Pinter Subitica Tech - College of Applied Sciences
Keywords: Kali Linux; tools; attack; security; ethical hacking


This paper deals with the problem of ethical hacking and security of computer systems. When we talk about security of an information system, we actually mean the primary three attributes of the system: confidentiality, integrity and availability. There are various approaches with aim to identify existing security weaknesses and security assessment. One of them is using Kali Linux operating system with its integrated effective tools specially adapted to the realization of various types of attacks. The paper gives a general overview of some Kali attacking possibilities on client and server side and highlights their specificities. The undoubted benefit of this operating system is a large collection of different hacking tools in one place which significantly facilitates vulnerability assessment and security testing.


Allen, L., Heriyanto, T., Ali, S. (2014). Kali Linux - Assuring Security by Penetration Testing. Packt Publishing. 54-64.
Hertzog, R., O'Gorman, J., Aharoni, M. (2017). Kali Linux Revealed. Offsec Press. 283-284.
Pritchett, W., De Smet, D. (2013). Kali Linux Cookbook, Packt Publishing.
Hybrid Analysis
Kali Linux Tools
MDN Web Docs
Offensive Security: Penetration Testing With Kali Linux
Official Kali Linux Documentation
OWASP Web Application Penetration Testing
Robtex DNS Lookup
Tech Terms
The Security Buddy
Whois Lookup
How to Cite
Cisar, P., & Pinter, R. (2019). Some ethical hacking possibilities in Kali Linux environment. Journal of Applied Technical and Educational Sciences, 9(4), 129-149.
Reviews, Application Notes, Case Studies, Reports, Book Review