UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 5 | May 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 11 Issue 4
April-2024
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR2404615


Registration ID:
536656

Page Number

g154-g159

Share This Article


Jetir RMS

Title

An Audit on security tools in Kali Linux

Abstract

Kali Linux, is a powerful and open source platform which has various types of tools (arsenal type of tools). These tools are used for various regions to empower cyber security, data integrity, confidentiality etc. This platform is mainly designed for penetration testing for ethical hackers, digital forensics, and for security auditing purposes.The tool kits in kali linux has a vast range of utilities which are specially made for ethical hacking purpose and for security assessment, digital defense purpose. By this review paper we will get to know a diverse range of security tools in Kali Linux, which include the purpose of the specific tools, the features provided by the tools, And where the tools are implemented in our daily life or for security purposes. We are going to begin this with how we categorize the security tools in Kali Linux on the basis of reconnaissance, vulnerability, exploitation, privilege escalation, forensics, packet sniffing, pivoting, and many more. These tools are only used for security reasons only. If any illegal activities occur they may lead to severe consequences. We are going to see a review on notable or widely used tools such as Nmap for network reconnaissance, Metasploit for penetration testing and exploitation, Wireshark for packet analysis, John the ripper for Password cracking and many more. These also evaluates the efficiency , usability, and versatility of these tools, providing many insights on their practical applications and for potential limitations of the tools. In conclusion, this review paper gives knowledge of and value of Kali Linux tools in different platforms for security professionals, ethical hackers, cyber security analysts. By providing them a wide range of powerful tools and specialized security tools. It empowers users to conduct thorough security assessments, identify different vulnerabilities, and ensures a safe and secure digital infrastructure against evolving threats.

Key Words

Powerful and versatile tools in Kali Linux, Security tools usage, Purpose and their features.

Cite This Article

"An Audit on security tools in Kali Linux", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.11, Issue 4, page no.g154-g159, April-2024, Available :http://www.jetir.org/papers/JETIR2404615.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"An Audit on security tools in Kali Linux", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.11, Issue 4, page no. ppg154-g159, April-2024, Available at : http://www.jetir.org/papers/JETIR2404615.pdf

Publication Details

Published Paper ID: JETIR2404615
Registration ID: 536656
Published In: Volume 11 | Issue 4 | Year April-2024
DOI (Digital Object Identifier):
Page No: g154-g159
Country: Pune, Maharastra, India .
Area: Science & Technology
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

00033

Print This Page

Current Call For Paper

Jetir RMS