Penetration Testing: Rolling Kali |
Author(s): |
Jyoti Pathak , Jahangirabad Institute of Technology; Afzl Ayyub, Jahangirabad Institute of Technology; Satyendra Mohan Srivastava, Jahangirabad Institute of Technology |
Keywords: |
Penetration Testing, Ethical Hacking, Kali Linux, Hacking, Cyber Security |
Abstract |
Recent news are full with some or the other kind of incidents in happening in the world with a common quote “Hackerâ€. A hacker is basically a person with IT expertise who gains access to someone else’s system without their permission. It is seen that a hacker attacks any computer system of any individual or a company either to bring it down or to leak confidential information. Hackers do these illegally for mainly two purposes. Firstly for the sake of money, or secondly to release information being censored from the public. These call themselves HACKTIVISTS who raise issues of social and political reforms. Then there are some people known as ETHICAL HACKERS. These are certified personnel who are authorized to legally attack any target to check for consequences in case of a real attack and suggest precautions and preventives measures. The various works processed by the Ethical Hackers comes under Penetration Testing. Kali Linux can be called the most advanced open source toolkit for Penetration Testing. It is a compilation of more than 600 tools applied to different fields of Online as well as Offline hacks. |
Other Details |
Paper ID: IJSRDV4I120450 Published in: Volume : 4, Issue : 12 Publication Date: 01/03/2017 Page(s): 504-507 |
Article Preview |
|
|