High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

Penetration Testing: Rolling Kali

Author(s):

Jyoti Pathak , Jahangirabad Institute of Technology; Afzl Ayyub, Jahangirabad Institute of Technology; Satyendra Mohan Srivastava, Jahangirabad Institute of Technology

Keywords:

Penetration Testing, Ethical Hacking, Kali Linux, Hacking, Cyber Security

Abstract

Recent news are full with some or the other kind of incidents in happening in the world with a common quote “Hacker”. A hacker is basically a person with IT expertise who gains access to someone else’s system without their permission. It is seen that a hacker attacks any computer system of any individual or a company either to bring it down or to leak confidential information. Hackers do these illegally for mainly two purposes. Firstly for the sake of money, or secondly to release information being censored from the public. These call themselves HACKTIVISTS who raise issues of social and political reforms. Then there are some people known as ETHICAL HACKERS. These are certified personnel who are authorized to legally attack any target to check for consequences in case of a real attack and suggest precautions and preventives measures. The various works processed by the Ethical Hackers comes under Penetration Testing. Kali Linux can be called the most advanced open source toolkit for Penetration Testing. It is a compilation of more than 600 tools applied to different fields of Online as well as Offline hacks.

Other Details

Paper ID: IJSRDV4I120450
Published in: Volume : 4, Issue : 12
Publication Date: 01/03/2017
Page(s): 504-507

Article Preview

Download Article