Volume- 10
Issue- 2
Year- 2022
DOI: 10.55524/ijircst. 2022.10.3.88 | DOI URL: https://doi.org/10.55524/ijircst. 2022.10.3.88
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0)
Article Tools: Print the Abstract | Indexing metadata | How to cite item | Email this article | Post a Comment
Dr. Ashish Oberoi
Though all material is now available online, numerous individuals are using it; most are using it to learn things, while many others are using it to educate both how to harm or stealing information from websites or networks without such owner’s permission. The purpose of this essay is to define hacking, who programmers seem to be, what vulnerability assessment is, what ethically hacking's code of conduct is, but also why browser hijackers are required. The Linux kernel is briefly described in detail.. All of the methods are carried out on the Kali Linux operating system. Following that, the article discusses phishing attacks and denial of service attacks (Denial of Services Attack). In addition, the paper discusses what Wi-Fi is, how to secure Wi-Fi networks, and how hackers crack Wi-Fi passwords. This paper is very useful for future work as researcher can use this paper for their survey.
1. Jamil D. IS ETHICAL HACKING ETHICAL ? 2011;3(5):3758–63.
2. Hartley RD. Ethical Hacking Pedagogy: An Analysis and Overview of Teaching Students to Hack. J Int Technol Inf Manag. 2015;24(4).
3. Jain RK, Kumar A, Singh NL, Tommasino L, Singh BK. Measurement of peak fluence of neutron beams using Bi-fission detectors. Pramana - J Phys. 2012;
4. Vignesh R, Rohini K. Analysis to determine the scope and Challenging responsibilities of Ethical Hacking employed in Cyber Security. Int J Eng Technol. 2018;
5. Kumar S, Singh MK, Jain RK, Singh V. Characteristics of the projectile and target fragments produced in 8 4 Kr 3 6 - Emulsion interaction at 1 GeV per nucleon. Int J Mod Phys E. 2020;
6. Singh MK, Kumar S, Jain RK, Singh V. Study of emission characteristics of the projectile fragments produced in the interaction of 84Kr36 with nuclear emulsion detector at 1 GeV. Chinese J Phys. 2020;
7. Chandra N, Parida S. Quantum entanglement in photon-induced electron spectroscopy of atoms and molecules its generation, characterization, and applications. In: Advances in Imaging and Electron Physics. 2016.
8. Tulasi Prasad S. Ethical Hacking and Types of Hackers. Int J Emerg Technol Comput Sci Electron. 2014;11(2).
9. Duksh YS, Kaushik BK, Agarwal RP. FDTD technique based crosstalk analysis of bundled SWCNT interconnects. J Semicond. 2015;
10. Rai J, Tripathi RC, Gulati N. A comparative study of implementing innovation in education sector due to COVID-19. In: Proceedings of the 2020 9th International Conference on System Modeling and Advancement in Research Trends, SMART 2020. 2020.
11. Hat Hackers.
12. Mishra N, Singhal P, Kundu S. Application of IoT products in smart cities of India. In: Proceedings of the 2020 9th International Conference on System Modeling and Advancement in Research Trends, SMART 2020. 2020.
13. Singh S, Kumar J. Miniaturized triband circular patch antenna for X band, Ku band and K band applications. In: Proceedings of the 2020 9th International Conference on System Modeling and Advancement in Research Trends, SMART 2020. 2020.
14. Al-Karaki JN, Ababneh N, Hamid Y, Gawanmeh A. Evaluating the effectiveness of distance learning in higher education during covid-19 global crisis: Uae educators’ perspectives. Contemp Educ Technol. 2021;
15. Jagtap MT, Tripathi RC, Jawalkar DK. Depth accuracy determination in 3-d stereoscopic image retargeting using DMA. In: Proceedings of the 2020 9th International Conference on System Modeling and Advancement in Research Trends, SMART 2020. 2020.
16. Pandey B, Sharma KP. Radar Transmogrification Technology: Support for Unmanned System. In: Proceedings - 2019 Amity International Conference on Artificial Intelligence, AICAI 2019. 2019.
17. Singh D. Robust controlling of thermal mixing procedure by means of sliding type controlling. Int J Eng Adv Technol. 2019;
18. Chow E. Ethical Hacking & Penetration Testing. IT Res Pap. 2011;
19. Anand V. Photovoltaic actuated induction motor for driving electric vehicle. Int J Eng Adv Technol. 2019;
20. Solanki MS, Goswami L, Sharma KP, Sikka R. Automatic Detection of Temples in consumer Images using histogram of Gradient. In: Proceedings of 2019 International Conference on Computational Intelligence and Knowledge Economy, ICCIKE 2019. 2019.
21. Solanki MS, Sharma DKP, Goswami L, Sikka R, Anand V. Automatic Identification of Temples in Digital Images through Scale Invariant Feature Transform. In: 2020 International Conference on Computer Science, Engineering and Applications, ICCSEA 2020. 2020.
22. Usha S, Jyothi MN, Sharadamma N, Dixit R, Devaraj VR, Nagesh babu R. Identification of microRNAs and their targets in Finger millet by high throughput sequencing. Gene. 2015;
23. Jain A, Jain S, Jain R, Kohli DV. Coated chitosan nanoparticles encapsulating caspase 3 activator for effective treatment of colorectral cancer. Drug Deliv Transl Res. 2015;
24. Ramos Brandão P. The Importance of Authentication and Encryption in Cloud Computing Framework Security. Int J Data Sci Technol. 2018;
25. Sah MK, Gupta DK, Rani P. Energy Efficient Routing Protocol for Wireless Sensor Networks with Multiple Sinks. In: Proceedings - 2015 2nd IEEE International Conference on Advances in Computing and Communication Engineering, ICACCE 2015. 2015.
Assistant Professor, Department of Computer Science & Engineering, RIMT University, Mandi Gobindgarh, Punjab, India
No. of Downloads: 29 | No. of Views: 655
Wenxuan Zheng, Mingxuan Yang, Decheng Huang, Meizhizi Jin.
November 2024 - Vol 12, Issue 6
Siti Nur.
November 2024 - Vol 12, Issue 6
Ahmet Egesoy, Gulce Leylek.
November 2024 - Vol 12, Issue 6