Some ethical hacking possibilities in Kali Linux environment

  • Petar Cisar University of Criminal Investigation and Police Studies
  • Robert Pinter Subitica Tech - College of Applied Sciences
##plugins.pubIds.doi.readerDisplayName##: https://doi.org/10.24368/jates.v9i4.139

Abstract

This paper deals with the problem of ethical hacking and security of computer systems. When we talk about security of an information system, we actually mean the primary three attributes of the system: confidentiality, integrity and availability. There are various approaches with aim to identify existing security weaknesses and security assessment. One of them is using Kali Linux operating system with its integrated effective tools specially adapted to the realization of various types of attacks. The paper gives a general overview of some Kali attacking possibilities on client and server side and highlights their specificities. The undoubted benefit of this operating system is a large collection of different hacking tools in one place which significantly facilitates vulnerability assessment and security testing.

References

Allen, L., Heriyanto, T., Ali, S. (2014). Kali Linux - Assuring Security by Penetration Testing. Packt Publishing. 54-64.
Hertzog, R., O'Gorman, J., Aharoni, M. (2017). Kali Linux Revealed. Offsec Press. 283-284.
Pritchett, W., De Smet, D. (2013). Kali Linux Cookbook, Packt Publishing.
Colasoft https://www.colasoft.com/resources/packet_sniffing.php
Hybrid Analysis https://www.hybrid-analysis.com/
Imperva https://www.imperva.com/learn/application-security/man-in-the-middle-attack-mitm/
Imperva https://www.imperva.com/learn/application-security/dns-spoofing/
Kali Linux Tools https://tools.kali.org/tools-listing
MDN Web Docs https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Strict-Transport-Security
Medium https://medium.com/@arnavtripathy98/how-to-make-a-fake-access-point-with-mana-toolkit-2464c1843d1e
Netcraft https://toolbar.netcraft.com/site_report
Offensive Security: Penetration Testing With Kali Linux https://www.offensive-security.com/documentation/penetration-testing-with-kali.pdf
Official Kali Linux Documentation https://docs.kali.org/pdf/kali-book-en.pdf
OWASP Web Application Penetration Testing https://www.owasp.org/index.php/Web_Application_Penetration_Testing
Robtex DNS Lookup https://www.robtex.com/
Tech Terms https://techterms.com/definition/macaddress
The Security Buddy https://www.thesecuritybuddy.com/vulnerabilities/what-is-code-injection-attack/
Udemy https://www.udemy.com/learn-ethical-hacking-from-scratch/
Veracode https://www.veracode.com/security/arp-spoofing
Whois Lookup http://whois.domaintools.com/
Published
2019-12-23
Section
Áttekintő cikk, alkalmazási jelentés, esettanulmány, jelentés, könyvismertető