Open Access

Uncovering Cybersecurity Vulnerabilities: A Kali Linux Investigative Exploration Perspective


Cite

Figure 1.

The Kali Linux Distribution Package
The Kali Linux Distribution Package

Figure 2.

The Various types of Kali Distributions
The Various types of Kali Distributions

Figure 3.

The Wi-Fi penetration testing process with its associated WEP encryption principle
The Wi-Fi penetration testing process with its associated WEP encryption principle

Figure 4.

Kali Linux Wi-Fi penetration technical methods with proposed Experimental network topology
Kali Linux Wi-Fi penetration technical methods with proposed Experimental network topology

Figure 5.

An overview of the results and findings of the proposed experimentations
An overview of the results and findings of the proposed experimentations
eISSN:
2470-8038
Language:
English
Publication timeframe:
4 times per year
Journal Subjects:
Computer Sciences, other