Penetration testing using Kali Linux: SQL injection, XSS, Wordpress, and WPA2 attacks
Nowadays, computers, smart phones, smart watches, printers, projectors, washing machines, fridges, and other mobile devices connected to Internet are exposed to various threats and exploits. Of the various attacks, SQL injection, cross site scripting, Wordpress, and WPA2 attack were the most popular...
| Main Authors: | Gunawan, Teddy Surya, Lim, Muhammad Kasim, Kartiwi, Mira, Abdul Malik, Noreha |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
Institute of Advanced Engineering and Science
2018
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/66218/ http://irep.iium.edu.my/66218/1/66218_Penetration%20Testing%20using%20Kali%20Linux.pdf http://irep.iium.edu.my/66218/2/66218_Penetration%20Testing%20using%20Kali%20Linux_SCOPUS.pdf |
Similar Items
On the review and setup of security audit using Kali Linux
by: Gunawan, Teddy Surya, et al.
Published: (2018)
by: Gunawan, Teddy Surya, et al.
Published: (2018)
SQL injection penetration testing tutorial
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
SQL Injection attack roadmap and fusion
by: Umar, Kabir, et al.
Published: (2016)
by: Umar, Kabir, et al.
Published: (2016)
Performance evaluation of multichannel audio compression
by: Gunawan, Teddy Surya, et al.
Published: (2018)
by: Gunawan, Teddy Surya, et al.
Published: (2018)
On the comparison of line spectral frequencies and mel-frequency cepstral coefficients using feedforward neural network for language identification
by: Gunawan, Teddy Surya, et al.
Published: (2018)
by: Gunawan, Teddy Surya, et al.
Published: (2018)
On the use of edge features and exponential decaying number of nodes in the hidden layers for handwritten signature recognition
by: Gunawan, Teddy Surya, et al.
Published: (2018)
by: Gunawan, Teddy Surya, et al.
Published: (2018)
Systematic literature review on SQL injection attack
by: Aminu, Lawal Muhammad, et al.
Published: (2016)
by: Aminu, Lawal Muhammad, et al.
Published: (2016)
Online information seeking behavior for cancer related disease: A developed and developing country comparison
by: Saleh, Nurliyana, et al.
Published: (2018)
by: Saleh, Nurliyana, et al.
Published: (2018)
Automatic Number Plate Recognition on android platform: With some Java code excerpts
by: ., Abdul Mutholib, et al.
Published: (2016)
by: ., Abdul Mutholib, et al.
Published: (2016)
Detection of SQL injection attack using machine learning
by: Tung, Tean Thong
Published: (2024)
by: Tung, Tean Thong
Published: (2024)
Speech emotion recognition using deep feedforward neural network
by: Alghifari, Muhammad Fahreza, et al.
Published: (2018)
by: Alghifari, Muhammad Fahreza, et al.
Published: (2018)
A Survey on SQL injection: vulnerabilities, attacks, and prevention techniques
by: Kindy, Diallo Abdoulaye, et al.
Published: (2011)
by: Kindy, Diallo Abdoulaye, et al.
Published: (2011)
Smart home system using internet of things: design, implementation and sample codes
by: Yaldi, Intan Rahmithul Husna, et al.
Published: (2018)
by: Yaldi, Intan Rahmithul Husna, et al.
Published: (2018)
Herb leaves pattern recognition using digital microscope and deep learning
by: Rahman, Muhammad Ariff Azizul, et al.
Published: (2019)
by: Rahman, Muhammad Ariff Azizul, et al.
Published: (2019)
Development of English handwritten recognition using deep neural network
by: Gunawan, Teddy Surya, et al.
Published: (2018)
by: Gunawan, Teddy Surya, et al.
Published: (2018)
Application of machine learning and artificial intelligence in detecting SQL injection attacks
by: Md Sultan, Abu Bakar, et al.
Published: (2024)
by: Md Sultan, Abu Bakar, et al.
Published: (2024)
A review on emotion recognition algorithms using speech analysis
by: Gunawan, Teddy Surya, et al.
Published: (2018)
by: Gunawan, Teddy Surya, et al.
Published: (2018)
A summarization of image and video databases for emotion recognition
by: Ashraf, Arselan, et al.
Published: (2020)
by: Ashraf, Arselan, et al.
Published: (2020)
Speech emotion recognition using feature fusion of TEO and MFCC on multilingual databases
by: Ahmad Qadri, Syed Asif, et al.
Published: (2020)
by: Ahmad Qadri, Syed Asif, et al.
Published: (2020)
Comparison of entropy coding mechanism on IEEE1857.2 lossless audio compression standard
by: Abdul Muin, Fathiah, et al.
Published: (2018)
by: Abdul Muin, Fathiah, et al.
Published: (2018)
Performance evaluation of portable air quality measurement
system using raspberry Pi for remote monitoring
by: Mohd Pu’ad, Muhammad Farhan, et al.
Published: (2019)
by: Mohd Pu’ad, Muhammad Farhan, et al.
Published: (2019)
A walk through SQL injection: vulnerabilities, attacks, and countermeasures in current and future networks
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
A detailed survey on various aspects of SQL Injection: vulnerabilities, innovative attacks, and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011)
Sukuk rating prediction using voting ensemble strategy
by: Kartiwi, Mira, et al.
Published: (2018)
by: Kartiwi, Mira, et al.
Published: (2018)
Decision tree optimization for sukuk rating prediction
by: Kartiwi, Mira, et al.
Published: (2018)
by: Kartiwi, Mira, et al.
Published: (2018)
A critical insight into multi-languages speech emotion databases
by: Ahmad Qadri, Syed Asif, et al.
Published: (2019)
by: Ahmad Qadri, Syed Asif, et al.
Published: (2019)
Preventing persistent cross-site scripting (XSS) attack by applying pattern filtering approach
by: Yusof, Imran, et al.
Published: (2014)
by: Yusof, Imran, et al.
Published: (2014)
Review of SQL injection : problems and prevention
by: Mohd Yunus, Mohd Amin, et al.
Published: (2018)
by: Mohd Yunus, Mohd Amin, et al.
Published: (2018)
A detailed survey on various aspects of SQL injection in web applications: vulnerabilities, innovative attacks and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
Prevention of attack on Islamic websites by fixing SQL injection vulnerabilities using co-evolutionary search approach
by: Umar, Kabir, et al.
Published: (2014)
by: Umar, Kabir, et al.
Published: (2014)
Development of low bit rate speech encoder based on vector quantization and compressive sensing
by: Kassim, Liban A. S., et al.
Published: (2012)
by: Kassim, Liban A. S., et al.
Published: (2012)
Edge detection of MRI images using artificial neural network
by: Gunawan, Teddy Surya, et al.
Published: (2017)
by: Gunawan, Teddy Surya, et al.
Published: (2017)
On the use of voice activity detection in speech emotion recognition
by: Alghifari, Muhammad Fahreza, et al.
Published: (2019)
by: Alghifari, Muhammad Fahreza, et al.
Published: (2019)
Taxonomy of SQL Injection: ML Trends & Open Challenges
by: Abobakr Busaeed, Raed Abdullah, et al.
Published: (2023)
by: Abobakr Busaeed, Raed Abdullah, et al.
Published: (2023)
Portable anti forgery recognition for attendance system using fingerprint based biometric
by: Zainal, Nur Izzati, et al.
Published: (2016)
by: Zainal, Nur Izzati, et al.
Published: (2016)
Fast and accurate algorithm for ECG authentication using residual depthwise separable convolutional neural networks
by: Ihsanto, Eko, et al.
Published: (2020)
by: Ihsanto, Eko, et al.
Published: (2020)
An efficient algorithm for cardiac arrhythmia classification using ensemble of depthwise Separable convolutional neural networks
by: Ihsanto, Eko, et al.
Published: (2020)
by: Ihsanto, Eko, et al.
Published: (2020)
Measuring the road traffic intensity using neural network with computer vision
by: Hasan Gani, Muhammad Hamdan, et al.
Published: (2018)
by: Hasan Gani, Muhammad Hamdan, et al.
Published: (2018)
Lethality of SQL injection against current and future Internet-technologies
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
Comparison of security testing approaches for detection of SQL injection vulnerabilities
by: Mohammed Draib, Najla’a Ateeq, et al.
Published: (2018)
by: Mohammed Draib, Najla’a Ateeq, et al.
Published: (2018)
Similar Items
-
On the review and setup of security audit using Kali Linux
by: Gunawan, Teddy Surya, et al.
Published: (2018) -
SQL injection penetration testing tutorial
by: Pathan, Al-Sakib Khan, et al.
Published: (2011) -
SQL Injection attack roadmap and fusion
by: Umar, Kabir, et al.
Published: (2016) -
Performance evaluation of multichannel audio compression
by: Gunawan, Teddy Surya, et al.
Published: (2018) -
On the comparison of line spectral frequencies and mel-frequency cepstral coefficients using feedforward neural network for language identification
by: Gunawan, Teddy Surya, et al.
Published: (2018)