TMV's Knowledge Resource Centre Digital Repository

Study System Infiltration And Related Problems

Show simple item record

dc.contributor.author Gaikwad, Jitendra
dc.contributor.author Nagarkar, Supriya
dc.date.accessioned 2024-04-30T08:54:45Z
dc.date.available 2024-04-30T08:54:45Z
dc.date.issued 2023-11
dc.identifier.citation Study System Infiltration And Related Problems en_US
dc.identifier.issn 2581-9879
dc.identifier.issn 0076-2571
dc.identifier.uri http://localhost:8080/xmlui/handle/123456789/16046
dc.description.abstract A comprehensive security programme must now include penetration testing. Ethical hackers use pen tests to simulate the tactics and movements of the attacker. This challenging work requires creativity, therefore you must fully comprehend it. The customer is subsequently supplied with all security issues found together with an evaluation of their impact on the system and in the corporate business scenario, as well as a technical remedy for abilities mitigation. This paper explores several Kali Linux penetration testing tools, how todeploy them, and how to utilise them to carry out various assaults, including attack methodology and defence tactics. Technically, using virtualized systems, tools, and private networks, we will carry out various penetration tests. assaults carried out included traffic spoofing, sniffing, and man-in-the-middle (MITM) assaults. Other attacks included Blue tooth hacking and camera espionage. en_US
dc.language.iso en en_US
dc.publisher Kesari Mahratta Trust en_US
dc.relation.ispartofseries Vol - I;Issue - I
dc.subject System Penetration en_US
dc.subject Network Security en_US
dc.subject Hacking en_US
dc.subject Penetration Testing en_US
dc.title Study System Infiltration And Related Problems en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account