Your browser does not allow JavaScript!
JavaScript is necessary for the proper functioning of this website. Please enable JavaScript or use a modern browser.
Open Science Slovenia
Open Science
DiKUL
slv
|
eng
Search
Browse
New in RUL
About RUL
In numbers
Help
Sign in
Uporaba operacijskega sistema Kali Linux za izvajanje varnostnih pregledov
ID
ŠPILER, SAMO
(
Author
),
ID
Sedlar, Urban
(
Mentor
)
More about this mentor...
PDF - Presentation file,
Download
(5,44 MB)
MD5: 8FA7BCA703A6C14808C80C31F30031E0
Image galllery
Abstract
Diplomska naloga v teoretičnem delu vključuje opredelitev etičnega hekanja in opise tipov testov za varnostne preglede sistemov. Navedli in opisali smo faze testiranja varnosti sistema ter predstavili odprtokodni operacijski sistem Kali. Programe, ki smo jih uporabili, smo tudi kategorizirali po fazah in opisali pripravo testnega okolja. V praktičnem delu smo varnostno pregledali strežnik Apache nameščeno spletno aplikacijo WordPress in dostopno točko Wi-Fi. Strežnik Apache smo postavili lokalno na operacijskem sistemu Ubuntu in na usmerjevalniku nastavili posredovanje vrat 80 oz. protokola za prenos hiperteksta. Strežnik smo uspešno onesposobili z napadom, ki ohromi storitev (angl. Denial of Service – DoS). Vdrli smo tudi v dostopno točko Wi-Fi, in sicer tako, da smo najprej zajeli razširljivi protokol za preverjanje pristnosti preko lokalnega omrežja (angl. Extensible authentication protocol over local area network - EAPoL), s katerim smo uspešno dešifrirali geslo. Na koncu smo navedli tudi nekaj možnosti, kako se lahko napadov, ki smo jih uspešno izvedli, ubranimo.
Language:
Slovenian
Keywords:
Etično hekanje
,
varnostni pregledi sistemov
,
programska orodja
,
odprta koda
,
Kali Linux
Work type:
Bachelor thesis/paper
Organization:
FE - Faculty of Electrical Engineering
Year:
2020
PID:
20.500.12556/RUL-116802
Publication date in RUL:
11.06.2020
Views:
2378
Downloads:
420
Metadata:
Cite this work
Plain text
BibTeX
EndNote XML
EndNote/Refer
RIS
ABNT
ACM Ref
AMA
APA
Chicago 17th Author-Date
Harvard
IEEE
ISO 690
MLA
Vancouver
:
Copy citation
Share:
Secondary language
Language:
English
Title:
Using the Kali Linux operating system for security audits
Abstract:
In theoretical part of this thesis we defined ethical hacking and described types of penetration testing. We also described phases of penetration testing and presented Kali Linux operating system. We described and categorized tools for hacking by their function and also presented our test environment. We did penetration testing on Apache host with installed with WordPress web application and on a Wi-Fi access point. Firstly we put up an Apache host on an operating system Ubuntu and configured the router for port forwarding on port 80. We have successfully disabled the Apache host with a DoS attack. We also hacked into Wi-Fi access point by firstly capturing Extensible authentication protocol over local area network (EAPoL) with which we were then able to crack WPA2 password. We have documented how we can mitigate these attacks that we have successfully performed.
Keywords:
Ethical hacking
,
penetration testing
,
software tools
,
open source
,
Kali Linux
Similar documents
Similar works from RUL:
Similar works from other Slovenian collections:
Back