Otwarty dostęp

Uncovering Cybersecurity Vulnerabilities: A Kali Linux Investigative Exploration Perspective


Zacytuj

This research exploration presents a comprehensive methodology for conducting penetration testing for networking security protocols and vulnerabilities on the Wi-Fi networks using Kali Linux, an open-source penetration testing platform. The methodology also encompasses four main stages which are Preparation, Information Gathering, Simulated Attack, Reporting. In the Preparation Stage, the scope of the penetration test is defined, authorization is obtained, and within the testing environment the experimentation is prepared. The Information Gathering Stage involves scanning for associated nearby wireless access points (APs), identifying encryption modes, and assessing network coverage. The Simulated Attack Phase verifies the types of vulnerabilities through password cracking, infrastructure penetration tests, and client-side attacks. Finally, the Reporting Phase entails compiling of a very detailed test report with results visualized, findings and recommendations with directions. Experimental results validate the overall effectiveness of the methodology in identifying and mitigating Wi-Fi network vulnerabilities. Through systematic testing and analysis, Kali Linux facilitates proactive security measures to enhance Wi-Fi network defenses.

eISSN:
2470-8038
Język:
Angielski
Częstotliwość wydawania:
4 razy w roku
Dziedziny czasopisma:
Computer Sciences, other