Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Reading LevelReading Level
-
Content TypeContent Type
-
YearFrom:-To:
-
More FiltersMore FiltersItem TypeIs Full-Text AvailableSubjectPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
37
result(s) for
"Kali Linux."
Sort by:
Testing the Data Protection Through Implementation of Secure Communication
2021
The security of using applications in cloud services and on the Internet is an important topic in the field of engineering. In this paper, two laboratory tests for data transmission protection, specifically designed for different security analysis techniques, are presented and explained. During lab tests on public Wi-Fi networks from the MIDM (“Man in the Middle”) attacks, various monitoring techniques were applied, using a special lab test scenario with Kali Linux penetration tools by creating an SSH tunnel on an Android mobile device. These test benches allow easy data capturing, and the captured data is processed using available software programs. Expected outcomes, practical improvement and security performance assessment are presented in detail, and considered in terms of their value in security engineering. The aim of this paper is to detect and overcome some of the weaknesses of the application of security protocols in a Wi-Fi network environment.
Journal Article
Web Penetration Testing with Kali Linux
by
Dieterle, Daniel W
,
Najera-Gutierrez, Gilberto
,
Ansari, Juned Ahmed
in
Penetration testing (Computer security)
2018
This book covers everything you need to set up a Kali Linux lab, the latest generation of the BackTrack Linux penetration testing and security auditing Linux distribution. Learn how to use the hundred tools Kali Linux has so you can manage security tasks such as penetration testing, forensics, and reverse engineering.
Linux basics for hackers : getting started with networking, scripting, and security in Kali
\"Builds a foundation of Linux skills; this guide also addresses MySQL, postgresql, and Python scripting. Provides access to numerous real-world examples and hands-on exercises\"-- Provided by publisher.
Uncovering Cybersecurity Vulnerabilities: A Kali Linux Investigative Exploration Perspective
by
Rawol, Ahmed Tajbiul
,
Akhtar, Zarif Bin
in
Artificial Intelligence (AI)
,
Computer forensics
,
Cybersecurity
2024
This research exploration presents a comprehensive methodology for conducting penetration testing for networking security protocols and vulnerabilities on the Wi-Fi networks using Kali Linux, an open-source penetration testing platform. The methodology also encompasses four main stages which are Preparation, Information Gathering, Simulated Attack, Reporting. In the Preparation Stage, the scope of the penetration test is defined, authorization is obtained, and within the testing environment the experimentation is prepared. The Information Gathering Stage involves scanning for associated nearby wireless access points (APs), identifying encryption modes, and assessing network coverage. The Simulated Attack Phase verifies the types of vulnerabilities through password cracking, infrastructure penetration tests, and client-side attacks. Finally, the Reporting Phase entails compiling of a very detailed test report with results visualized, findings and recommendations with directions. Experimental results validate the overall effectiveness of the methodology in identifying and mitigating Wi-Fi network vulnerabilities. Through systematic testing and analysis, Kali Linux facilitates proactive security measures to enhance Wi-Fi network defenses.
Journal Article
Kali Linux cookbook : effective penetration testing solutions
\"Kali Linux is a Linux distribution designed for penetration testing and security auditing. It is the successor to BackTrack, the world's most popular penetration testing distribution. Kali Linux is the most widely used platform and toolkit for penetration testing. Security is currently the hottest field in technology with a projected need for millions of security professionals. Kali Linux Cookbook, Second Edition focuses on enhancing your knowledge in Kali Linux for security by expanding your skills with toolkits and frameworks that can increase your value as a security professional. This book starts by helping you install Kali Linux on different systems. You will also learn about the lab architecture and install a Windows host for use in the lab. Next, you will understand the concept of vulnerability analysis and look at the different types of exploit. The book will introduce you to the concept and psychology of Social Engineering and password cracking. You will then be able to use these skills to expand the scope of any breaches you create. Finally, the book will guide you in exploiting specific technologies and gaining access to other systems in the environment. By the end of this book, you will have gained the core knowledge and concepts of the penetration testing process.\"--Back cover.
Hands-On Penetration Testing on Windows
2018,2024
Penetration testing is highly competitive, and it's easy to get stuck in the same routine client after client. This book will provide hands-on experience with penetration testing while guiding you through behind-the-scenes action along the way.