Приказ основних података о документу
Ethical Hacking of Wireless Networks in Kali Linux Environment
dc.creator | Čisar, P. | |
dc.creator | Maravić Čisar, S. | |
dc.date.accessioned | 2023-12-11T13:16:29Z | |
dc.date.available | 2023-12-11T13:16:29Z | |
dc.date.issued | 2018 | |
dc.identifier.issn | ISSN 1584-2665 (printed editions, in two fascicules) | |
dc.identifier.issn | ISSN: 2601-2332 (online, all four fascicules) | |
dc.identifier.uri | http://jakov.kpu.edu.rs/handle/123456789/1528 | |
dc.description.abstract | The topic of this paper is related to the wireless network security problems. For identifying existing security weaknesses, there is a variety of approaches among which is Kali Linux operating system. General cracking procedure of wireless networks consists of several steps. The efficiency of cracking the key and determining the password are the two essentials on which the effectivenss of the procedure depends on. This phase of cracking is also the most demanding. A large collection of different tools for vulnerability assessment and penetration testing designed primarily for ethical hacking is undoubtedly the benefit of this operating system. | sr |
dc.language.iso | en | sr |
dc.publisher | Timisoara : University Politehnica | sr |
dc.rights | restrictedAccess | sr |
dc.source | ANNALS of the Faculty Engineering Hunedoara – International Journal of Engineering (Online) | sr |
dc.subject | wireless network | sr |
dc.subject | security weaknesses | sr |
dc.subject | vulnerability assessment | sr |
dc.subject | penetration testing | sr |
dc.title | Ethical Hacking of Wireless Networks in Kali Linux Environment | sr |
dc.type | article | sr |
dc.rights.license | ARR | sr |
dc.citation.volume | 16 | |
dc.citation.issue | 3 | |
dc.citation.spage | 181 | |
dc.citation.epage | 186 | |
dc.identifier.rcub | https://hdl.handle.net/21.15107/rcub_jakov_1528 | |
dc.type.version | publishedVersion | sr |