Accès libre

Uncovering Cybersecurity Vulnerabilities: A Kali Linux Investigative Exploration Perspective

À propos de cet article

Citez

Figure 1.

The Kali Linux Distribution Package
The Kali Linux Distribution Package

Figure 2.

The Various types of Kali Distributions
The Various types of Kali Distributions

Figure 3.

The Wi-Fi penetration testing process with its associated WEP encryption principle
The Wi-Fi penetration testing process with its associated WEP encryption principle

Figure 4.

Kali Linux Wi-Fi penetration technical methods with proposed Experimental network topology
Kali Linux Wi-Fi penetration technical methods with proposed Experimental network topology

Figure 5.

An overview of the results and findings of the proposed experimentations
An overview of the results and findings of the proposed experimentations
eISSN:
2470-8038
Langue:
Anglais
Périodicité:
4 fois par an
Sujets de la revue:
Computer Sciences, other