Some ethical hacking possibilities in Kali Linux environment
Abstract
This paper deals with the problem of ethical hacking and security of computer systems. When we talk about security of an information system, we actually mean the primary three attributes of the system: confidentiality, integrity and availability. There are various approaches with aim to identify existing security weaknesses and security assessment. One of them is using Kali Linux operating system with its integrated effective tools specially adapted to the realization of various types of attacks. The paper gives a general overview of some Kali attacking possibilities on client and server side and highlights their specificities. The undoubted benefit of this operating system is a large collection of different hacking tools in one place which significantly facilitates vulnerability assessment and security testing.
References
Hertzog, R., O'Gorman, J., Aharoni, M. (2017). Kali Linux Revealed. Offsec Press. 283-284.
Pritchett, W., De Smet, D. (2013). Kali Linux Cookbook, Packt Publishing.
Colasoft https://www.colasoft.com/resources/packet_sniffing.php
Hybrid Analysis https://www.hybrid-analysis.com/
Imperva https://www.imperva.com/learn/application-security/man-in-the-middle-attack-mitm/
Imperva https://www.imperva.com/learn/application-security/dns-spoofing/
Kali Linux Tools https://tools.kali.org/tools-listing
MDN Web Docs https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Strict-Transport-Security
Medium https://medium.com/@arnavtripathy98/how-to-make-a-fake-access-point-with-mana-toolkit-2464c1843d1e
Netcraft https://toolbar.netcraft.com/site_report
Offensive Security: Penetration Testing With Kali Linux https://www.offensive-security.com/documentation/penetration-testing-with-kali.pdf
Official Kali Linux Documentation https://docs.kali.org/pdf/kali-book-en.pdf
OWASP Web Application Penetration Testing https://www.owasp.org/index.php/Web_Application_Penetration_Testing
Robtex DNS Lookup https://www.robtex.com/
Tech Terms https://techterms.com/definition/macaddress
The Security Buddy https://www.thesecuritybuddy.com/vulnerabilities/what-is-code-injection-attack/
Udemy https://www.udemy.com/learn-ethical-hacking-from-scratch/
Veracode https://www.veracode.com/security/arp-spoofing
Whois Lookup http://whois.domaintools.com/
Copyright (c) 2019 Journal of Applied Technical and Educational Sciences
This work is licensed under a Creative Commons Attribution 4.0 International License.
The submitting author warrants that the submission is original and that she/he is the author of the submission
together with the named co-authors; to the extend the submission incorporates text passages, figures, data or
other material from the work of others, the submitting author has obtained any necessary permission.
Articles in this journal are published under the Creative Commons Attribution Licence (CC-BY), the author retains
the copyright. By submitting an article the author grants to this journal the non-exclusive right to publish it
(e.g., post it to an institutional repository or publish it in a book).