Penetration testing using Kali Linux: SQL injection, XSS, Wordpress, and WPA2 attacks
Nowadays, computers, smart phones, smart watches, printers, projectors, washing machines, fridges, and other mobile devices connected to Internet are exposed to various threats and exploits. Of the various attacks, SQL injection, cross site scripting, Wordpress, and WPA2 attack were the most popular...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English English |
Published: |
Institute of Advanced Engineering and Science
2018
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/66218/1/66218_Penetration%20Testing%20using%20Kali%20Linux.pdf http://irep.iium.edu.my/66218/2/66218_Penetration%20Testing%20using%20Kali%20Linux_SCOPUS.pdf http://irep.iium.edu.my/66218/ https://www.iaescore.com/journals/index.php/IJEECS/article/view/14545/9407 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Islam Antarabangsa Malaysia |
Language: | English English |
id |
my.iium.irep.66218 |
---|---|
record_format |
dspace |
spelling |
my.iium.irep.662182018-09-12T02:41:47Z http://irep.iium.edu.my/66218/ Penetration testing using Kali Linux: SQL injection, XSS, Wordpress, and WPA2 attacks Gunawan, Teddy Surya Lim, Muhammad Kasim Kartiwi, Mira Abdul Malik, Noreha TK7885 Computer engineering Nowadays, computers, smart phones, smart watches, printers, projectors, washing machines, fridges, and other mobile devices connected to Internet are exposed to various threats and exploits. Of the various attacks, SQL injection, cross site scripting, Wordpress, and WPA2 attack were the most popular security attacks and will be further investigated in this paper. Kali Linux provides a great platform and medium in learning various types of exploits and penetration testing. All the simulated attack will be conducted using Kali Linux installed on virtual machine in a computer with Intel Core i5 and 8 GB RAM, while the victim’s machine is the host computer which run Windows 10 version 1709. Results showed that the attacks launched both on web and firewall were conducted successfully. Institute of Advanced Engineering and Science 2018-11 Article PeerReviewed application/pdf en http://irep.iium.edu.my/66218/1/66218_Penetration%20Testing%20using%20Kali%20Linux.pdf application/pdf en http://irep.iium.edu.my/66218/2/66218_Penetration%20Testing%20using%20Kali%20Linux_SCOPUS.pdf Gunawan, Teddy Surya and Lim, Muhammad Kasim and Kartiwi, Mira and Abdul Malik, Noreha (2018) Penetration testing using Kali Linux: SQL injection, XSS, Wordpress, and WPA2 attacks. Indonesian Journal of Electrical Engineering and Computer Science, 12 (2). pp. 729-737. ISSN 2502-4752 https://www.iaescore.com/journals/index.php/IJEECS/article/view/14545/9407 10.11591/ijeecs.v12.i2.pp729-737 |
institution |
Universiti Islam Antarabangsa Malaysia |
building |
IIUM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
International Islamic University Malaysia |
content_source |
IIUM Repository (IREP) |
url_provider |
http://irep.iium.edu.my/ |
language |
English English |
topic |
TK7885 Computer engineering |
spellingShingle |
TK7885 Computer engineering Gunawan, Teddy Surya Lim, Muhammad Kasim Kartiwi, Mira Abdul Malik, Noreha Penetration testing using Kali Linux: SQL injection, XSS, Wordpress, and WPA2 attacks |
description |
Nowadays, computers, smart phones, smart watches, printers, projectors, washing machines, fridges, and other mobile devices connected to Internet are exposed to various threats and exploits. Of the various attacks, SQL injection, cross site scripting, Wordpress, and WPA2 attack were the most popular security attacks and will be further investigated in this paper. Kali Linux provides a great platform and medium in learning various types of exploits and penetration testing. All the simulated attack will be conducted using Kali Linux installed on virtual machine in a computer with Intel Core i5 and 8 GB RAM, while the victim’s machine is the host computer which run Windows 10 version 1709. Results showed that the attacks launched both on web and firewall were conducted successfully. |
format |
Article |
author |
Gunawan, Teddy Surya Lim, Muhammad Kasim Kartiwi, Mira Abdul Malik, Noreha |
author_facet |
Gunawan, Teddy Surya Lim, Muhammad Kasim Kartiwi, Mira Abdul Malik, Noreha |
author_sort |
Gunawan, Teddy Surya |
title |
Penetration testing using Kali Linux: SQL injection, XSS, Wordpress, and WPA2 attacks |
title_short |
Penetration testing using Kali Linux: SQL injection, XSS, Wordpress, and WPA2 attacks |
title_full |
Penetration testing using Kali Linux: SQL injection, XSS, Wordpress, and WPA2 attacks |
title_fullStr |
Penetration testing using Kali Linux: SQL injection, XSS, Wordpress, and WPA2 attacks |
title_full_unstemmed |
Penetration testing using Kali Linux: SQL injection, XSS, Wordpress, and WPA2 attacks |
title_sort |
penetration testing using kali linux: sql injection, xss, wordpress, and wpa2 attacks |
publisher |
Institute of Advanced Engineering and Science |
publishDate |
2018 |
url |
http://irep.iium.edu.my/66218/1/66218_Penetration%20Testing%20using%20Kali%20Linux.pdf http://irep.iium.edu.my/66218/2/66218_Penetration%20Testing%20using%20Kali%20Linux_SCOPUS.pdf http://irep.iium.edu.my/66218/ https://www.iaescore.com/journals/index.php/IJEECS/article/view/14545/9407 |
_version_ |
1643617691050704896 |