Ethical Hacking and Hacking Attacks

Authors

  • Divyaraj Makwana
  • Rutvik Jadav
  • Rudra Panchal
  • Viral Mehta
  • Rushali Jadav
  • Hardik Parmar

DOI:

https://doi.org/10.63682/jns.v14i28S.6729

Keywords:

N/A

Abstract

Nowadays, as all the information is available online, a large number of users are accessing it. Some of them use this information to gain knowledge, while others use it to learn how to destroy or steal data from websites or databases without the knowledge of the owner. The purpose of this paper is to explain what hacking is, who hackers are, what ethical hacking is, the code of conduct for ethical hackers, and the need for them. All techniques are performed on the Linux operating system known as Kali Linux. Furthermore, the paper covers some basic hacking attacks including MiTM Attack (Man in The Middle Attack), Phishing Attack, and DoS Attack (Denial of Service Attack). Additionally, it covers what Wi‑Fi is, the techniques used for Wi‑Fi protection, and the methods used by hackers to hack Wi‑Fi passwords.

 

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

References

www.google.com

Downloads

Published

2025-05-29

How to Cite

1.
Makwana D, Jadav R, Panchal R, Mehta V, Jadav R, Parmar H. Ethical Hacking and Hacking Attacks. J Neonatal Surg [Internet]. 2025May29 [cited 2025Sep.21];14(28S):940-5. Available from: https://www.jneonatalsurg.com/index.php/jns/article/view/6729