izpis_h1_title_alt

Uporaba operacijskega sistema Kali Linux za izvajanje varnostnih pregledov
ID ŠPILER, SAMO (Author), ID Sedlar, Urban (Mentor) More about this mentor... This link opens in a new window

.pdfPDF - Presentation file, Download (5,44 MB)
MD5: 8FA7BCA703A6C14808C80C31F30031E0

Abstract
Diplomska naloga v teoretičnem delu vključuje opredelitev etičnega hekanja in opise tipov testov za varnostne preglede sistemov. Navedli in opisali smo faze testiranja varnosti sistema ter predstavili odprtokodni operacijski sistem Kali. Programe, ki smo jih uporabili, smo tudi kategorizirali po fazah in opisali pripravo testnega okolja. V praktičnem delu smo varnostno pregledali strežnik Apache nameščeno spletno aplikacijo WordPress in dostopno točko Wi-Fi. Strežnik Apache smo postavili lokalno na operacijskem sistemu Ubuntu in na usmerjevalniku nastavili posredovanje vrat 80 oz. protokola za prenos hiperteksta. Strežnik smo uspešno onesposobili z napadom, ki ohromi storitev (angl. Denial of Service – DoS). Vdrli smo tudi v dostopno točko Wi-Fi, in sicer tako, da smo najprej zajeli razširljivi protokol za preverjanje pristnosti preko lokalnega omrežja (angl. Extensible authentication protocol over local area network - EAPoL), s katerim smo uspešno dešifrirali geslo. Na koncu smo navedli tudi nekaj možnosti, kako se lahko napadov, ki smo jih uspešno izvedli, ubranimo.

Language:Slovenian
Keywords:Etično hekanje, varnostni pregledi sistemov, programska orodja, odprta koda, Kali Linux
Work type:Bachelor thesis/paper
Organization:FE - Faculty of Electrical Engineering
Year:2020
PID:20.500.12556/RUL-116802 This link opens in a new window
Publication date in RUL:11.06.2020
Views:2378
Downloads:420
Metadata:XML DC-XML DC-RDF
:
Copy citation
Share:Bookmark and Share

Secondary language

Language:English
Title:Using the Kali Linux operating system for security audits
Abstract:
In theoretical part of this thesis we defined ethical hacking and described types of penetration testing. We also described phases of penetration testing and presented Kali Linux operating system. We described and categorized tools for hacking by their function and also presented our test environment. We did penetration testing on Apache host with installed with WordPress web application and on a Wi-Fi access point. Firstly we put up an Apache host on an operating system Ubuntu and configured the router for port forwarding on port 80. We have successfully disabled the Apache host with a DoS attack. We also hacked into Wi-Fi access point by firstly capturing Extensible authentication protocol over local area network (EAPoL) with which we were then able to crack WPA2 password. We have documented how we can mitigate these attacks that we have successfully performed.

Keywords:Ethical hacking, penetration testing, software tools, open source, Kali Linux

Similar documents

Similar works from RUL:
Similar works from other Slovenian collections:

Back