Penetration testing using Kali Linux: SQL injection, XSS, Wordpress, and WPA2 attacks
Nowadays, computers, smart phones, smart watches, printers, projectors, washing machines, fridges, and other mobile devices connected to Internet are exposed to various threats and exploits. Of the various attacks, SQL injection, cross site scripting, Wordpress, and WPA2 attack were the most popular...
Main Authors: | Gunawan, Teddy Surya, Lim, Muhammad Kasim, Kartiwi, Mira, Abdul Malik, Noreha |
---|---|
Format: | Article |
Language: | English English |
Published: |
Institute of Advanced Engineering and Science
2018
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/66218/ http://irep.iium.edu.my/66218/ http://irep.iium.edu.my/66218/ http://irep.iium.edu.my/66218/1/66218_Penetration%20Testing%20using%20Kali%20Linux.pdf http://irep.iium.edu.my/66218/2/66218_Penetration%20Testing%20using%20Kali%20Linux_SCOPUS.pdf |
Similar Items
-
On the review and setup of security audit using Kali Linux
by: Gunawan, Teddy Surya, et al.
Published: (2018) -
SQL injection penetration testing tutorial
by: Pathan, Al-Sakib Khan, et al.
Published: (2011) -
A Survey on SQL injection: vulnerabilities, attacks, and prevention techniques
by: Kindy, Diallo Abdoulaye, et al.
Published: (2011) -
A detailed survey on various aspects of SQL Injection: vulnerabilities, innovative attacks, and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011) -
A walk through SQL injection: vulnerabilities, attacks, and countermeasures in current and future networks
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)