2021
DOI: 10.25007/ajnu.v10n1a998
|View full text |Cite
|
Sign up to set email alerts
|

Penetration Testing: Wireless Network Attacks Method on Kali Linux OS

Abstract: This paper implements a wireless attack technique by cracking the password on kali Linux OS using Hashcat technique. This study identifies the security weakness, using brute-force attack for online attacking and straight attack for offline attacking. The brute-force attack is also recognized as a detailed search, where it attempts guessing the target password one password at a time until reaching the correct password, which is called a dictionary attack. then using hash algorithms to deal with MD5 hash algorit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
14
0
2

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
2
1

Relationship

1
9

Authors

Journals

citations
Cited by 21 publications
(16 citation statements)
references
References 3 publications
0
14
0
2
Order By: Relevance
“…[15] Of these risks, which must be prepared for, are the risks of counterfeiting, counterfeiting and money laundering, in addition to their impact on monetary policy, which is one of the most important tools of the Central Bank to achieve economic stability, as monetary policy is one of the main pillars in building macroeconomic policy, and virtual currencies have an impact on tools Monetary policy and its objectives, that is why it is necessary for central banks to develop a unified framework for organizing virtual money and setting controls for its issuance and circulation. [16] VII. QUALITY TOOLS:…”
Section: The Impact Of Digital Currencies On the Monetary Policy Of C...mentioning
confidence: 99%
“…[15] Of these risks, which must be prepared for, are the risks of counterfeiting, counterfeiting and money laundering, in addition to their impact on monetary policy, which is one of the most important tools of the Central Bank to achieve economic stability, as monetary policy is one of the main pillars in building macroeconomic policy, and virtual currencies have an impact on tools Monetary policy and its objectives, that is why it is necessary for central banks to develop a unified framework for organizing virtual money and setting controls for its issuance and circulation. [16] VII. QUALITY TOOLS:…”
Section: The Impact Of Digital Currencies On the Monetary Policy Of C...mentioning
confidence: 99%
“…Remote monitoring allows the data security team to collect information, diagnose problems, and oversee all the applications and hardware from a remote location. Remote monitoring provides flexibility and convenience, enabling administrators to resolve any issue anytime, anywhere [8].…”
Section: Remote Monitoring Softwarementioning
confidence: 99%
“…Cybersecurity prevents numerous sorts of sensitive and critical data from being stolen or harmed (Asaad, 2021;Pearson et al, 2011). This protection may be afforded to either the nation as a whole, corporations, or even individual persons.…”
Section: Introductionmentioning
confidence: 99%