Analysis of Kali Linux Penetration Tools: A Survey of Hacking Tools | IEEE Conference Publication | IEEE Xplore

Analysis of Kali Linux Penetration Tools: A Survey of Hacking Tools


Abstract:

Computing technology is becoming more prolific in of user adoption and advancement of technology. We are finding new ways of automation and capturing information. informa...Show More

Abstract:

Computing technology is becoming more prolific in of user adoption and advancement of technology. We are finding new ways of automation and capturing information. information as they say is power and power is money. Hence, powerful rich targets are bound to be attractive to many hackers. The rise in cybercrime and the ransom attack of the Southern US gas pipeline highlight the need for securing our computer and network systems. one security method employed by information Systems Security professionals is hacking networks with penetration testing tools. This paper reviews and analyzes 18 different tools covering 6 different areas. The analysis ends with a discussion of how businesses and security professionals can use these tools to help prevent attacks, maintain the integrity of the organization's cyber space, and keep costs down.
Date of Conference: 09-10 December 2021
Date Added to IEEE Xplore: 11 February 2022
ISBN Information:
Conference Location: Cape Town, South Africa

Contact IEEE to Subscribe

References

References is not available for this document.