Analysis of Kali Linux Penetration Testing Tools: A Survey of Hacking Tools: A Survey of Hacking Tools

Matthew Tigner, Hayden Wimmer, Carl M. Rebmann

Research output: Contribution to book or proceedingConference articlepeer-review

6 Scopus citations

Abstract

Computing technology is becoming more prolific in of user adoption and advancement of technology. We are finding new ways of automation and capturing information. information as they say is power and power is money. Hence, powerful rich targets are bound to be attractive to many hackers. The rise in cybercrime and the ransom attack of the Southern US gas pipeline highlight the need for securing our computer and network systems. one security method employed by information Systems Security professionals is hacking networks with penetration testing tools. This paper reviews and analyzes 18 different tools covering 6 different areas. The analysis ends with a discussion of how businesses and security professionals can use these tools to help prevent attacks, maintain the integrity of the organization's cyber space, and keep costs down.

Original languageAmerican English
Title of host publicationInternational Conference on Electrical, Computer, and Energy Technologies, ICECET 2021
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781665442312
DOIs
StatePublished - Feb 11 2021
Event2021 International Conference on Electrical, Computer, and Energy Technologies, ICECET 2021 - Cape Town, South Africa
Duration: Dec 9 2021Dec 10 2021

Publication series

NameInternational Conference on Electrical, Computer, and Energy Technologies, ICECET 2021

Conference

Conference2021 International Conference on Electrical, Computer, and Energy Technologies, ICECET 2021
Country/TerritorySouth Africa
CityCape Town
Period12/9/2112/10/21

Scopus Subject Areas

  • Electrical and Electronic Engineering
  • General Computer Science
  • Energy Engineering and Power Technology

Disciplines

  • Computer Sciences

Keywords

  • cybersecurity
  • information systems security
  • Kali Linux
  • penetration tools
  • testing

Fingerprint

Dive into the research topics of 'Analysis of Kali Linux Penetration Testing Tools: A Survey of Hacking Tools: A Survey of Hacking Tools'. Together they form a unique fingerprint.

Cite this