Ethical Hacking and Hacking Attacks
DOI:
https://doi.org/10.63682/jns.v14i28S.6729Keywords:
N/AAbstract
Nowadays, as all the information is available online, a large number of users are accessing it. Some of them use this information to gain knowledge, while others use it to learn how to destroy or steal data from websites or databases without the knowledge of the owner. The purpose of this paper is to explain what hacking is, who hackers are, what ethical hacking is, the code of conduct for ethical hackers, and the need for them. All techniques are performed on the Linux operating system known as Kali Linux. Furthermore, the paper covers some basic hacking attacks including MiTM Attack (Man in The Middle Attack), Phishing Attack, and DoS Attack (Denial of Service Attack). Additionally, it covers what Wi‑Fi is, the techniques used for Wi‑Fi protection, and the methods used by hackers to hack Wi‑Fi passwords.
Downloads
Metrics
References
www.google.com
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
Terms:
- Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.