Penetration testing using Kali Linux: SQL injection, XSS, Wordpress, and WPA2 attacks
Nowadays, computers, smart phones, smart watches, printers, projectors, washing machines, fridges, and other mobile devices connected to Internet are exposed to various threats and exploits. Of the various attacks, SQL injection, cross site scripting, Wordpress, and WPA2 attack were the most popular...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English English |
Published: |
Institute of Advanced Engineering and Science
2018
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/66218/ http://irep.iium.edu.my/66218/ http://irep.iium.edu.my/66218/ http://irep.iium.edu.my/66218/1/66218_Penetration%20Testing%20using%20Kali%20Linux.pdf http://irep.iium.edu.my/66218/2/66218_Penetration%20Testing%20using%20Kali%20Linux_SCOPUS.pdf |
id |
iium-66218 |
---|---|
recordtype |
eprints |
spelling |
iium-662182018-09-12T02:41:47Z http://irep.iium.edu.my/66218/ Penetration testing using Kali Linux: SQL injection, XSS, Wordpress, and WPA2 attacks Gunawan, Teddy Surya Lim, Muhammad Kasim Kartiwi, Mira Abdul Malik, Noreha TK7885 Computer engineering Nowadays, computers, smart phones, smart watches, printers, projectors, washing machines, fridges, and other mobile devices connected to Internet are exposed to various threats and exploits. Of the various attacks, SQL injection, cross site scripting, Wordpress, and WPA2 attack were the most popular security attacks and will be further investigated in this paper. Kali Linux provides a great platform and medium in learning various types of exploits and penetration testing. All the simulated attack will be conducted using Kali Linux installed on virtual machine in a computer with Intel Core i5 and 8 GB RAM, while the victim’s machine is the host computer which run Windows 10 version 1709. Results showed that the attacks launched both on web and firewall were conducted successfully. Institute of Advanced Engineering and Science 2018-11 Article PeerReviewed application/pdf en http://irep.iium.edu.my/66218/1/66218_Penetration%20Testing%20using%20Kali%20Linux.pdf application/pdf en http://irep.iium.edu.my/66218/2/66218_Penetration%20Testing%20using%20Kali%20Linux_SCOPUS.pdf Gunawan, Teddy Surya and Lim, Muhammad Kasim and Kartiwi, Mira and Abdul Malik, Noreha (2018) Penetration testing using Kali Linux: SQL injection, XSS, Wordpress, and WPA2 attacks. Indonesian Journal of Electrical Engineering and Computer Science, 12 (2). pp. 729-737. ISSN 2502-4752 https://www.iaescore.com/journals/index.php/IJEECS/article/view/14545/9407 10.11591/ijeecs.v12.i2.pp729-737 |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
International Islamic University Malaysia |
building |
IIUM Repository |
collection |
Online Access |
language |
English English |
topic |
TK7885 Computer engineering |
spellingShingle |
TK7885 Computer engineering Gunawan, Teddy Surya Lim, Muhammad Kasim Kartiwi, Mira Abdul Malik, Noreha Penetration testing using Kali Linux: SQL injection, XSS, Wordpress, and WPA2 attacks |
description |
Nowadays, computers, smart phones, smart watches, printers, projectors, washing machines, fridges, and other mobile devices connected to Internet are exposed to various threats and exploits. Of the various attacks, SQL injection, cross site scripting, Wordpress, and WPA2 attack were the most popular security attacks and will be further investigated in this paper. Kali Linux provides a great platform and medium in learning various types of exploits and penetration testing. All the simulated attack will be conducted using Kali Linux installed on virtual machine in a computer with Intel Core i5 and 8 GB RAM, while the victim’s machine is the host computer which run Windows 10 version 1709. Results showed that the attacks launched both on web and firewall were conducted successfully. |
format |
Article |
author |
Gunawan, Teddy Surya Lim, Muhammad Kasim Kartiwi, Mira Abdul Malik, Noreha |
author_facet |
Gunawan, Teddy Surya Lim, Muhammad Kasim Kartiwi, Mira Abdul Malik, Noreha |
author_sort |
Gunawan, Teddy Surya |
title |
Penetration testing using Kali Linux: SQL injection, XSS, Wordpress, and WPA2 attacks |
title_short |
Penetration testing using Kali Linux: SQL injection, XSS, Wordpress, and WPA2 attacks |
title_full |
Penetration testing using Kali Linux: SQL injection, XSS, Wordpress, and WPA2 attacks |
title_fullStr |
Penetration testing using Kali Linux: SQL injection, XSS, Wordpress, and WPA2 attacks |
title_full_unstemmed |
Penetration testing using Kali Linux: SQL injection, XSS, Wordpress, and WPA2 attacks |
title_sort |
penetration testing using kali linux: sql injection, xss, wordpress, and wpa2 attacks |
publisher |
Institute of Advanced Engineering and Science |
publishDate |
2018 |
url |
http://irep.iium.edu.my/66218/ http://irep.iium.edu.my/66218/ http://irep.iium.edu.my/66218/ http://irep.iium.edu.my/66218/1/66218_Penetration%20Testing%20using%20Kali%20Linux.pdf http://irep.iium.edu.my/66218/2/66218_Penetration%20Testing%20using%20Kali%20Linux_SCOPUS.pdf |
first_indexed |
2023-09-18T21:33:58Z |
last_indexed |
2023-09-18T21:33:58Z |
_version_ |
1777412697201049600 |