Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Content Type
      Content Type
      Clear All
      Content Type
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Item Type
    • Is Full-Text Available
    • Subject
    • Publisher
    • Source
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
37 result(s) for "Kali Linux."
Sort by:
Testing the Data Protection Through Implementation of Secure Communication
The security of using applications in cloud services and on the Internet is an important topic in the field of engineering. In this paper, two laboratory tests for data transmission protection, specifically designed for different security analysis techniques, are presented and explained. During lab tests on public Wi-Fi networks from the MIDM (“Man in the Middle”) attacks, various monitoring techniques were applied, using a special lab test scenario with Kali Linux penetration tools by creating an SSH tunnel on an Android mobile device. These test benches allow easy data capturing, and the captured data is processed using available software programs. Expected outcomes, practical improvement and security performance assessment are presented in detail, and considered in terms of their value in security engineering. The aim of this paper is to detect and overcome some of the weaknesses of the application of security protocols in a Wi-Fi network environment.
Uncovering Cybersecurity Vulnerabilities: A Kali Linux Investigative Exploration Perspective
This research exploration presents a comprehensive methodology for conducting penetration testing for networking security protocols and vulnerabilities on the Wi-Fi networks using Kali Linux, an open-source penetration testing platform. The methodology also encompasses four main stages which are Preparation, Information Gathering, Simulated Attack, Reporting. In the Preparation Stage, the scope of the penetration test is defined, authorization is obtained, and within the testing environment the experimentation is prepared. The Information Gathering Stage involves scanning for associated nearby wireless access points (APs), identifying encryption modes, and assessing network coverage. The Simulated Attack Phase verifies the types of vulnerabilities through password cracking, infrastructure penetration tests, and client-side attacks. Finally, the Reporting Phase entails compiling of a very detailed test report with results visualized, findings and recommendations with directions. Experimental results validate the overall effectiveness of the methodology in identifying and mitigating Wi-Fi network vulnerabilities. Through systematic testing and analysis, Kali Linux facilitates proactive security measures to enhance Wi-Fi network defenses.
Linux basics for hackers : getting started with networking, scripting, and security in Kali
\"Builds a foundation of Linux skills; this guide also addresses MySQL, postgresql, and Python scripting. Provides access to numerous real-world examples and hands-on exercises\"-- Provided by publisher.
A Simple Experimental Stand for Studying the Network Security Level of Power Electronic Devices
In this work the use of an experimental setup for studying the network security level of power electronic devices is proposed. A methodology which represents the individual stages of the studying process of the network security level of power electronic devices is also developed. To prove the applicability of the developed experimental setup, two power distribution units were studied. The experimental setup is simple and easy to implement. It uses well known tools for network security analysis and traffic monitoring. From the experimental studies carried out, it was found that the two power distribution units have similar network vulnerabilities and the exchange of the information is unsecure. From the penetration tests carried-out, expected results were found, but unexpected ones were also found. The experimental results prove the applicability of the developed experimental setup for studying the network security level of power electronic devices.
Real‐Time Cyberattack Detection for SCADA in Power System
Supervisory Control and Data Acquisition (SCADA) systems monitor and control industrial processes, but their integration with information technology and network connectivity, including the internet, exposes them to potential cyber threats. As SCADA systems become essential infrastructure, their vulnerability to cyber‐attacks has increased, necessitating a comprehensive understanding of potential risks. This paper presents a laboratory setup mimicking a real‐world SCADA system, involving the simulation of an IEEE 14 Bus system integrated with IEDs. The communication link between the SCADA centre and IEDs is established through the MODBUS communication protocol. This paper further analyzes and detects cyber‐attacks targeting SCADA systems, including Ping flood attack, UDP flood attack, Smurf attack, and Random flood attack. All these attacks are executed using Kali Linux tools. The Wireshark tool is employed to analyse network traffic and detect these attacks, which are also validated in real time using OPAL‐RT (OP4510). The results demonstrate the successful implementation and detection of cyber‐attacks, contributing to a deeper understanding of cyber threats and informing proactive security strategies to strengthen the security of Power SCADA systems against evolving cyber threats.
Kali Linux cookbook : effective penetration testing solutions
\"Kali Linux is a Linux distribution designed for penetration testing and security auditing. It is the successor to BackTrack, the world's most popular penetration testing distribution. Kali Linux is the most widely used platform and toolkit for penetration testing. Security is currently the hottest field in technology with a projected need for millions of security professionals. Kali Linux Cookbook, Second Edition focuses on enhancing your knowledge in Kali Linux for security by expanding your skills with toolkits and frameworks that can increase your value as a security professional. This book starts by helping you install Kali Linux on different systems. You will also learn about the lab architecture and install a Windows host for use in the lab. Next, you will understand the concept of vulnerability analysis and look at the different types of exploit. The book will introduce you to the concept and psychology of Social Engineering and password cracking. You will then be able to use these skills to expand the scope of any breaches you create. Finally, the book will guide you in exploiting specific technologies and gaining access to other systems in the environment. By the end of this book, you will have gained the core knowledge and concepts of the penetration testing process.\"--Back cover.
Studying the Impact of a UDP DoS Attack on the Parameters of VoIP Voice and Video Streams
This work studies the hypothesis of whether the UDP DoS attack affects voice and video flows in a VoIP network. It is a continuation of a previous work that studied the same hypothesis, but the VoIP server was under different types of TCP DoS attacks. The studied VoIP platform is the Asterisk FreePBX. A simple IP network model was developed for the purpose of the study. The used platform for the modeling of IP networks is GNS3. The study is conventionally divided into two parts: in the first part, only voice streams are exchanged in the network, and the server is subjected to a UDP DoS attack, and in the second part, only video streams are exchanged in the network, and again, Asterisk is subjected to a UDP DoS attack. The obtained results confirm the results of the previous study—the performance of the Asterisk FreePBX is not affected by the UDP DoS attack. Although the server is flooded with UDP packets, it works and is not blocked, and different types of VoIP calls are realized without problems. The UDP DoS attack does not affect the parameters of voice and video VoIP streams.