Repository logo
 

Uncovering Cybersecurity Vulnerabilities: A Kali Linux Investigative Exploration Perspective

Published version
Peer-reviewed

Repository DOI


Change log

Abstract

Abstract This research exploration presents a comprehensive methodology for conducting penetration testing for networking security protocols and vulnerabilities on the Wi-Fi networks using Kali Linux, an open-source penetration testing platform. The methodology also encompasses four main stages which are Preparation, Information Gathering, Simulated Attack, Reporting. In the Preparation Stage, the scope of the penetration test is defined, authorization is obtained, and within the testing environment the experimentation is prepared. The Information Gathering Stage involves scanning for associated nearby wireless access points (APs), identifying encryption modes, and assessing network coverage. The Simulated Attack Phase verifies the types of vulnerabilities through password cracking, infrastructure penetration tests, and client-side attacks. Finally, the Reporting Phase entails compiling of a very detailed test report with results visualized, findings and recommendations with directions. Experimental results validate the overall effectiveness of the methodology in identifying and mitigating Wi-Fi network vulnerabilities. Through systematic testing and analysis, Kali Linux facilitates proactive security measures to enhance Wi-Fi network defenses.

Description

Peer reviewed: True


Publication status: Published

Journal Title

International Journal of Advanced Network Monitoring and Controls

Conference Name

Journal ISSN

2470-8038
2470-8038

Volume Title

Publisher

De Gruyter

Rights and licensing

Except where otherwised noted, this item's license is described as Attribution-NonCommercial-NoDerivatives 4.0 International