A Study on Ethical Hacking

Abstract

Though all material is now available online, numerous individuals are using it; most are using it to learn things, while many others are using it to educate both how to harm or stealing information from websites or networks without such owner’s permission. The purpose of this essay is to define hacking, who programmers seem to be, what vulnerability assessment is, what ethically hacking's code of conduct is, but also why browser hijackers are required. The Linux kernel is briefly described in detail.. All of the methods are carried out on the Kali Linux operating system. Following that, the article discusses phishing attacks and denial of service attacks (Denial of Services Attack). In addition, the paper discusses what Wi-Fi is, how to secure Wi-Fi networks, and how hackers crack Wi-Fi passwords. This paper is very useful for future work as researcher can use this paper for their survey.

Authors and Affiliations

Dr. Ashish Oberoi

Keywords

Related Articles

Revolutionizing Education with Geekbits: A Comprehensive Study

In an era where digital technology pervades every aspect of our lives, education too has undergone a profound transformation. Geekbits emerges as a pioneering solution, aiming to revolutionize the learning experience for...

Effect of Acid Treated Recycled Aggregate On Properties of Concrete

The main factors effecting the usage of recycled course aggregate (RCA) in concrete mix was its lack of quality. The surface of the recycled aggregate may contain some cement mortar which affects the quality of recycled...

An Efficient Approach for Patterns of Oriented Motion Flow Facial Expression Recognition from Depth Video

Patterns of directed motion flow (POMF) from optical flow data is a novel feature illustration method that we have a tendency to propose in this paper to recognize the correct facial expression from facial video.The POMF...

Grid Interactive Solar Inverters and Their Impact on Power System

The inverter in a grid interactive structure can transform solar generate DC power into AC power that is then fed directly to the grid. As a building receive this AC energy, it is circulated to instruments and lighting a...

A Study of Asphalt Mixes with Natural Fibre (Sisal Fiber) By Experiment

The main aim of this study was to determine the benefits of use of naturally available Fibre called SISAL fibre used as additive in Bituminous concrete. Bituminous Mixture In which all component were mixed, placed and c...

Download PDF file
  • EP ID EP746659
  • DOI 10.55524/ijircst. 2022.10.3.88
  • Views 3
  • Downloads 0

How To Cite

Dr. Ashish Oberoi (2022). A Study on Ethical Hacking. International Journal of Innovative Research in Computer Science and Technology, 10(2), -. https://europub.co.uk/articles/-A-746659