Ethical Hacking of Wireless Networks in Kali Linux Environment
Само за регистроване кориснике
2018
Чланак у часопису (Објављена верзија)
Метаподаци
Приказ свих података о документуАпстракт
The topic of this paper is related to the wireless network security problems. For identifying existing security weaknesses, there is a variety of approaches among which is Kali Linux operating system. General cracking procedure of wireless networks consists of several steps. The efficiency of cracking the key and determining the password are the two essentials on which the effectivenss of the procedure depends on. This phase of cracking is also the most demanding. A large collection of different tools for vulnerability assessment and penetration testing designed primarily for ethical hacking is undoubtedly the benefit of this operating system.
Кључне речи:
wireless network / security weaknesses / vulnerability assessment / penetration testingИзвор:
ANNALS of the Faculty Engineering Hunedoara – International Journal of Engineering (Online), 2018, 16, 3, 181-186Издавач:
- Timisoara : University Politehnica
ISSN: ISSN 1584-2665 (printed editions, in two fascicules); ISSN: 2601-2332 (online, all four fascicules)
[ Google Scholar ]Институција/група
JakovTY - JOUR AU - Čisar, P. AU - Maravić Čisar, S. PY - 2018 UR - http://jakov.kpu.edu.rs/handle/123456789/1528 AB - The topic of this paper is related to the wireless network security problems. For identifying existing security weaknesses, there is a variety of approaches among which is Kali Linux operating system. General cracking procedure of wireless networks consists of several steps. The efficiency of cracking the key and determining the password are the two essentials on which the effectivenss of the procedure depends on. This phase of cracking is also the most demanding. A large collection of different tools for vulnerability assessment and penetration testing designed primarily for ethical hacking is undoubtedly the benefit of this operating system. PB - Timisoara : University Politehnica T2 - ANNALS of the Faculty Engineering Hunedoara – International Journal of Engineering (Online) T1 - Ethical Hacking of Wireless Networks in Kali Linux Environment VL - 16 IS - 3 SP - 181 EP - 186 UR - https://hdl.handle.net/21.15107/rcub_jakov_1528 ER -
@article{ author = "Čisar, P. and Maravić Čisar, S.", year = "2018", abstract = "The topic of this paper is related to the wireless network security problems. For identifying existing security weaknesses, there is a variety of approaches among which is Kali Linux operating system. General cracking procedure of wireless networks consists of several steps. The efficiency of cracking the key and determining the password are the two essentials on which the effectivenss of the procedure depends on. This phase of cracking is also the most demanding. A large collection of different tools for vulnerability assessment and penetration testing designed primarily for ethical hacking is undoubtedly the benefit of this operating system.", publisher = "Timisoara : University Politehnica", journal = "ANNALS of the Faculty Engineering Hunedoara – International Journal of Engineering (Online)", title = "Ethical Hacking of Wireless Networks in Kali Linux Environment", volume = "16", number = "3", pages = "181-186", url = "https://hdl.handle.net/21.15107/rcub_jakov_1528" }
Čisar, P.,& Maravić Čisar, S.. (2018). Ethical Hacking of Wireless Networks in Kali Linux Environment. in ANNALS of the Faculty Engineering Hunedoara – International Journal of Engineering (Online) Timisoara : University Politehnica., 16(3), 181-186. https://hdl.handle.net/21.15107/rcub_jakov_1528
Čisar P, Maravić Čisar S. Ethical Hacking of Wireless Networks in Kali Linux Environment. in ANNALS of the Faculty Engineering Hunedoara – International Journal of Engineering (Online). 2018;16(3):181-186. https://hdl.handle.net/21.15107/rcub_jakov_1528 .
Čisar, P., Maravić Čisar, S., "Ethical Hacking of Wireless Networks in Kali Linux Environment" in ANNALS of the Faculty Engineering Hunedoara – International Journal of Engineering (Online), 16, no. 3 (2018):181-186, https://hdl.handle.net/21.15107/rcub_jakov_1528 .