The objective of this project is to describe and test the most important hacking tools available in the Kali Linux distribution. This distribution, based on UNIX, contains tools for network auditing, cracking passwords and traffic sniffing of various protocols (TCP, UDP, HTTP, SSH, ..). The hosts used to test the attacks will be based on UNIX, Windows and Android architecture. It is very important to previously study the architecture of the target (host, network) because the attacks are focused on the vulnerabilities of each architecture. Therefore, the study of the target is a critical step in the hacking process. The project also contains a section devoted to hacking WLAN networks using different techniques (active and passive attacks) an...
Diplomski rad podijeljen je u dvije cjeline. Prva cjelina sadrži teoriju o računalnim mrežama, podje...
The massive development of technology especially in computers, mobile devices, and networking has br...
This work is focused on penetration testing of web applications. The theoretical part describes this...
The objective of this project is to describe and test the most important hacking tools available in ...
El presente trabajo destaca la importancia de la Seguridad de la Información en las organizaciones y...
The topic of this paper is related to the wireless network security problems. For identifying existi...
This paper deals with the problem of ethical hacking and security of computer systems. When we talk ...
Kali Linux okruženje je temeljeno na Debian Linux distribuciji usmjereno na napredno testiranje pene...
This thesis illustrates the security measures and mechanisms behind the encryption and decryption of...
El presente proyecto de investigación tuvo como objetivo analizar las vulnerabilidades existentes en...
Linux es el kernel más utilizado en los sistemas empotrados, dispositivos cuya disponibilidad públic...
Tutor : Xavier Salleras SolerA programming bug in an Operating System can bring down an entire serve...
Nowadays, computers, smart phones, smart watches, printers, projectors, washing machines, fridges, a...
Nowadays, computers, smart phones, smart watches, printers, projectors, washing machines, fridges, a...
The massive development of technology especially in computers, mobile devices, and networking has br...
Diplomski rad podijeljen je u dvije cjeline. Prva cjelina sadrži teoriju o računalnim mrežama, podje...
The massive development of technology especially in computers, mobile devices, and networking has br...
This work is focused on penetration testing of web applications. The theoretical part describes this...
The objective of this project is to describe and test the most important hacking tools available in ...
El presente trabajo destaca la importancia de la Seguridad de la Información en las organizaciones y...
The topic of this paper is related to the wireless network security problems. For identifying existi...
This paper deals with the problem of ethical hacking and security of computer systems. When we talk ...
Kali Linux okruženje je temeljeno na Debian Linux distribuciji usmjereno na napredno testiranje pene...
This thesis illustrates the security measures and mechanisms behind the encryption and decryption of...
El presente proyecto de investigación tuvo como objetivo analizar las vulnerabilidades existentes en...
Linux es el kernel más utilizado en los sistemas empotrados, dispositivos cuya disponibilidad públic...
Tutor : Xavier Salleras SolerA programming bug in an Operating System can bring down an entire serve...
Nowadays, computers, smart phones, smart watches, printers, projectors, washing machines, fridges, a...
Nowadays, computers, smart phones, smart watches, printers, projectors, washing machines, fridges, a...
The massive development of technology especially in computers, mobile devices, and networking has br...
Diplomski rad podijeljen je u dvije cjeline. Prva cjelina sadrži teoriju o računalnim mrežama, podje...
The massive development of technology especially in computers, mobile devices, and networking has br...
This work is focused on penetration testing of web applications. The theoretical part describes this...