Some ethical hacking possibilities in Kali Linux environment
Abstract
This paper deals with the problem of ethical hacking and security of computer systems. When we talk about security of an information system, we actually mean the primary three attributes of the system: confidentiality, integrity and availability. There are various approaches with aim to identify existing security weaknesses and security assessment. One of them is using Kali Linux operating system with its integrated effective tools specially adapted to the realization of various types of attacks. The paper gives a general overview of some Kali attacking possibilities on client and server side and highlights their specificities. The undoubted benefit of this operating system is a large collection of different hacking tools in one place which significantly facilitates vulnerability assessment and security testing.
References
Hertzog, R., O'Gorman, J., Aharoni, M. (2017). Kali Linux Revealed. Offsec Press. 283-284.
Pritchett, W., De Smet, D. (2013). Kali Linux Cookbook, Packt Publishing.
Colasoft https://www.colasoft.com/resources/packet_sniffing.php
Hybrid Analysis https://www.hybrid-analysis.com/
Imperva https://www.imperva.com/learn/application-security/man-in-the-middle-attack-mitm/
Imperva https://www.imperva.com/learn/application-security/dns-spoofing/
Kali Linux Tools https://tools.kali.org/tools-listing
MDN Web Docs https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Strict-Transport-Security
Medium https://medium.com/@arnavtripathy98/how-to-make-a-fake-access-point-with-mana-toolkit-2464c1843d1e
Netcraft https://toolbar.netcraft.com/site_report
Offensive Security: Penetration Testing With Kali Linux https://www.offensive-security.com/documentation/penetration-testing-with-kali.pdf
Official Kali Linux Documentation https://docs.kali.org/pdf/kali-book-en.pdf
OWASP Web Application Penetration Testing https://www.owasp.org/index.php/Web_Application_Penetration_Testing
Robtex DNS Lookup https://www.robtex.com/
Tech Terms https://techterms.com/definition/macaddress
The Security Buddy https://www.thesecuritybuddy.com/vulnerabilities/what-is-code-injection-attack/
Udemy https://www.udemy.com/learn-ethical-hacking-from-scratch/
Veracode https://www.veracode.com/security/arp-spoofing
Whois Lookup http://whois.domaintools.com/
Copyright (c) 2019 Journal of Applied Technical and Educational Sciences
This work is licensed under a Creative Commons Attribution 4.0 International License.
A szerző, aki a beadványt készíti, garantálja, hogy a beadvány eredeti és ő a társszerzőkkel együtt a szerzője, valamint a mások munkáiból vett szövegrészletek, képek, adatok és egyéb kapcsolódó anyagok esetében a szerző a szükséges engedélyeket megkapta.
A folyóiratban megjelenő beadványok a Creative Commons Attribution Licence (CC-BY) licensz alapján publikáltak, a szerzők a szerzői jogot megtartják.
A beadvány benyújtásával a szerzők nem kizárólagos jogot adnak a folyóiratnak a publikálásra (például elhelyezése intézményi repozitóriumban vagy megjelentetése könyvben).