<?xml version="1.0" encoding="utf-8"?><!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2d1 20170631//EN" "JATS-journalpublishing1.dtd">
<ArticleSet>
  <Article>
    <Journal>
      <PublisherName>IJIRCSTJournal</PublisherName>
      <JournalTitle>International Journal of Innovative Research in Computer Science and Technology</JournalTitle>
      <PISSN>I</PISSN>
      <EISSN>S</EISSN>
      <Volume-Issue>Volume 10 Issue 2</Volume-Issue>
      <PartNumber/>
      <IssueTopic>Computer Science</IssueTopic>
      <IssueLanguage>English</IssueLanguage>
      <Season>March - April 2022</Season>
      <SpecialIssue>N</SpecialIssue>
      <SupplementaryIssue>N</SupplementaryIssue>
      <IssueOA>Y</IssueOA>
      <PubDate>
        <Year>2022</Year>
        <Month>05</Month>
        <Day>31</Day>
      </PubDate>
      <ArticleType>Computer Sciences</ArticleType>
      <ArticleTitle>A Study on Ethical Hacking</ArticleTitle>
      <SubTitle/>
      <ArticleLanguage>English</ArticleLanguage>
      <ArticleOA>Y</ArticleOA>
      <FirstPage>435</FirstPage>
      <LastPage>438</LastPage>
      <AuthorList>
        <Author>
          <FirstName>Dr. Ashish Oberoi</FirstName>          
          <AuthorLanguage>English</AuthorLanguage>
          <Affiliation/>
          <CorrespondingAuthor>Y</CorrespondingAuthor>
          <ORCID/>
             
        </Author>
      </AuthorList>
      <DOI>https://doi.org/10.55524/ijircst. 2022.10.3.88</DOI>
      <Abstract>Though all material is now available online, numerous individuals are using it; most are using it to learn things, while many others are using it to educate both how to harm or stealing information from websites or networks without such owner&amp;rsquo;s permission. The purpose of this essay is to define hacking, who programmers seem to be, what vulnerability assessment is, what ethically hacking&amp;#39;s code of conduct is, but also why browser hijackers are required. The Linux kernel is briefly described in detail.. All of the methods are carried out on the Kali Linux operating system. Following that, the article discusses phishing attacks and denial of service attacks (Denial of Services Attack). In addition, the paper discusses what Wi-Fi is, how to secure Wi-Fi networks, and how hackers crack Wi-Fi passwords. This paper is very useful for future work as researcher can use this paper for their survey.</Abstract>
      <AbstractLanguage>English</AbstractLanguage>
      <Keywords>Computer, Data, Ethical Hacking, Hacker, Security.</Keywords>
      <URLs>
        <Abstract>https://ijircst.org/abstract.php?article_id=925</Abstract>
      </URLs>      
    </Journal>
  </Article>
</ArticleSet>