Professional Documents
Culture Documents
Analysis of Cyber Security Attacks Using Kali Linux: April 2022
Analysis of Cyber Security Attacks Using Kali Linux: April 2022
net/publication/361283096
CITATION READS
1 2,967
5 authors, including:
Gururaj H L
Manipal Institute of Technology
115 PUBLICATIONS 428 CITATIONS
SEE PROFILE
All content following this page was uploaded by Gururaj H L on 10 November 2022.
Janhavi V
Computer Science Engineering
Vidyavardhaka College of Engineering
Mysuru, India
janhavi.v@vvce.ac.in
Authorized licensed use limited to: MANIPAL INSTITUTE OF TECHNOLOGY. Downloaded on November 09,2022 at 07:13:56 UTC from IEEE Xplore. Restrictions apply.
information and discount extortion. Computerized attack is This device is for the most part introduced in kali Linux
generally called a PC network attack (CNA). appropriations, so there is no compelling reason to
unequivocally stress over it [9]. Since it is preinstalled in the
In PCs and PC affiliations, an assault is any endeavour kali linux, run setoolkits order for the instrument's GUI to
to uncover, change, cripple, destroy, take, or gain data spring up. When the order is executed, a GUI like this
through unapproved authorization to or utilize a resource. A should spring up.
cyber attack is any disagreeable move that objections PC
data structures, foundations, PC affiliations, or PC gadgets.
An assailant is an individual or cycle those endeavours to
get, as far as possible, or other limited spaces of the
framework without support, conceivably with destructive
explanation. Subject to the unique circumstance, cyber
attacks can be critical for cyber warfare or cyber terrorism.
A cyber attack can be utilized by sovereign states, people,
parties, society, or affiliations, and it might start from a dark
source. A thing that works with a cyber attack is by and
large called a cyber weapon.
256
Authorized licensed use limited to: MANIPAL INSTITUTE OF TECHNOLOGY. Downloaded on November 09,2022 at 07:13:56 UTC from IEEE Xplore. Restrictions apply.
Use any one of these options to carry out the attack. But Now enter an Email ID and password. Sign In and see if
to make the objective simple, select 1 for web templates. the tool was able to catch the credentials.
Fig.8. Credentials entered by victim is visible
Fig.5. Enter IP address
257
Authorized licensed use limited to: MANIPAL INSTITUTE OF TECHNOLOGY. Downloaded on November 09,2022 at 07:13:56 UTC from IEEE Xplore. Restrictions apply.
through all potential blends of legal characters in gathering Fig.12. Word List
[6].
A developer may use a creature power attack to get
permission to a site and record, then take data, shut the site
down, or execute another kind of attack. Creature power is
seen as a reliable, despite the fact that dreary, approach.
Animal power attacks will commonly use automated
gadgets to figure distinctive blends of usernames and
passwords until they track down the right data. The more
drawn out the mysterious expression, the extra time it will
usually bring to find the right data.
Fig.9. Implementation stage of Brute Force Attack.
Hydra -l /usr/share/wordlists/metasploit/user -P
/user/share/wordlists/metasploit/ passwords
ftp://192.168.1.101 -V
where –V is the username and password while trying
As shown in the below, the username and password are
found which are msfadmin:msfadmin.
Hydra is a pre-introduced apparatus in Kali Linux used Fig.13. Once the command is executed the username and the password is
to animal power username and secret word to various found
administrations like ftp, ssh, telnet, MS-SQL, and so forth
It is a parallelized network login saltine worked in
different working frameworks like Kali Linux, Parrot and
other significant entrance testing conditions [7]. Hydra
works by utilizing various ways to deal with perform beast
power assaults to figure the right username and secret key
blend. Hydra is normally utilized by infiltration analyzers.
To open get started with, go to Applications →
Password Attacks → Online Attacks → hydra.
1) Preventive measures
Fig.10. Select Password Attack • Limit fizzled login endeavors
• Make the root client blocked off by means of SSH
by altering the sshd_config document
• Use Captcha
• Limit logins to a predetermined IP address or reach
• Two factor verification
258
Authorized licensed use limited to: MANIPAL INSTITUTE OF TECHNOLOGY. Downloaded on November 09,2022 at 07:13:56 UTC from IEEE Xplore. Restrictions apply.
In SQL infusion the information base question will be
controlled and cause it to accomplish something that it is in Get the database name that is in the web application, both
a perfect world shouldn't do. So here the SQL inquiry is the next step is to find the table name that is in the database.
controlled, a pernicious string has been infused through the Fig.16. Command to fetch tables in the database
sql question and cause it to accomplish something that it
should do. At the point when a controlled question and a
pernicious string is shipped off the information base it is
executed in the data set and its pertinent outcomes are
returned.
Fig.17. Tables names present in the database
Fig.14. Manipulation of SQL Query.
1) SQL map
SQLmap is an open-source entrance testing gadget that
mechanizes the way toward seeing and mishandling SQL
Fig.19. Column names present in the database
imbuement imperfections and taking over of data base
specialists [10]. It goes with an inconceivable locale engine,
diverse strength features for a conclusive way analyzer and
a broad level of changes encountering data base
fingerprinting, over data getting from the illuminating
combination, to getting to the central narrative system and
executing orders on the functioning plan all through of-band
affiliations.
SQL map is maybe the best instrument open to
distinguish SQL injections. It comes pre-consolidated in the
Kali transport. You can discover it at − Applications → Now look for the username that is in the database
Database Assessment → Sqlmap.initial step open sqlmap accurate table user’s column uname using the following
then run the accompanying order. command.
$sudo sqlmap -U Fig.20. Command for fetching username that is in the database accurate
table user’s column uname.
testphp.vulnweb.com/artists.php?artist=1 –dbs
259
Authorized licensed use limited to: MANIPAL INSTITUTE OF TECHNOLOGY. Downloaded on November 09,2022 at 07:13:56 UTC from IEEE Xplore. Restrictions apply.
Now look for the username that is in the database acuart
table user’s column pass using the following command.
2) Preventive measures
• Say no to dynamic SQL and yes to arranged
explanations.
• Sanitize client input
Now look for the username that is in the database acuart • Limit data set consents
table user’s column email using the following command.
• Limit the presentation of explicit blunders
Fig.23. Command to fetch username that is in the database accurate table
user’s column email. D. Trojan Horse
Trojan Horse is one of the cyber attacks. users can
receive an email from someone they know, including an
attachment that looks legitimate [11]. When the email is
opened and the malicious attachment is downloaded, the
Trojan server installs and runs automatically whenever the
Fig.24. Username obtained. infected device is turned on. The malicious file is
downloaded as shown in Figure 9. Tools can be infected by
the Trojan through social engineering techniques, which
cybercriminals use to force users to download a malicious
application [12]. A malicious file can be hidden in banner
ads, pop-up ads or links on websites. A computer infected
with Trojan malware can spread it to other computers.
However, the attachment contains malicious code that
implements and installs the Trojan on their device.
260
Authorized licensed use limited to: MANIPAL INSTITUTE OF TECHNOLOGY. Downloaded on November 09,2022 at 07:13:56 UTC from IEEE Xplore. Restrictions apply.
Figure 26 shows the rate in which the file • Know what to do on the off chance that you
downloaded is infected with Trojan. The quality of every become a casualty.
file will vary.
1) Preventive Measures IV. LIMITATION AND PROBLEMS OF VARIOUS
• Never download or present programming from a ATTACKS
source you don't trust in completely.
In the cutting edge period of business, digital protection
isn't as large an issue as it is today. Banks are bound to get
• Never open an association or run a program
phishing or Ransomware assaults than conventional
transported off you in an email from someone you haven't
burglaries, and numerous workers don't have a clue what
the haziest.
those two expressions mean. In a time of limitless
admittance to data, a disturbing number of representatives in
• Keep all thing on your PC completely instructed
organizations and organizations all throughout the planet are
regarding the latest patches.
inadequately outfitted to manage underground programmers
• Make sure a Trojan antivirus is presented and and digital aggressors who focus on their work
running on your PC. environments consistently. Individuals are regularly 'points
of failures in these assaults in light of the fact that most
dangers permit admittance to its organizations on the
E. Website Attack
grounds that representatives have fallen.
The SET "web assault" vector is a one-of-a-kind method
of using numerous electronic assaults to bargain the A. Lack of Understanding of Importance
proposed casualty. It is by a long shot the most well-known Shockingly, in any event, when robots can perform
assault vector of SET [14]. It works like program autopen many errands, people are by and large pleased with being
where a few (or explicit) assaults can be shipped off the the just animals equipped for doing as such, organizations
objective program. An assault vector is a route utilized by place extraordinary dependence on people to oversee digital
aggressors to misuse frameworks and access the objective organizations and security, and to do what they feel is best if
framework or organization. Then again, an assault surface is there should be an occurrence of an online assault or
the aggregate sum of assault vectors that might be utilized to dubious experience. Many organizations don't see the
abuse any piece of your organization, working frameworks requirement for digital protection mindfulness preparing in
or the information facilitated inside. light of the fact that they have not yet experienced huge
scope digital assaults and are certain about their labor force
As shown in Figure 7 Fake website will be created by
to deal with any limited scale danger. This is unadulterated
the attacker. When the victim opens that website, it will ask
obliviousness because of absence of the board instruction -
to sign-in. The information entered by the victims will goes
not many standard individuals are totally established in
to attacker terminal.
digital life, and most representatives need some type of
Fig.27. Fake Google website has been created by the attacker and sent preparing to endure different assaults and programmers.
to the victims. Coming get-togethers business. Along these lines, network
safety mindfulness preparing is typically futile in light of the
fact that it doesn't occur in any case, so it doesn't profit the
work environment.
B. Lack of Consistancy
261
Authorized licensed use limited to: MANIPAL INSTITUTE OF TECHNOLOGY. Downloaded on November 09,2022 at 07:13:56 UTC from IEEE Xplore. Restrictions apply.
safety dangers - then, at that point they ought to really watch [4] Most. Mithyla Zaman, Most. Mithyla Zaman and Tasnim Morium
Mukur “Internal Security Monitoring of an Organization by Scapy &
out and center. Acquainting the genuine right with these Kali Linux” in United International University Dhaka,
tests, and treating network safety as other significant Bangladesh(December 2018), 1-30.
abilities required in work environment, will make [5] Petar Cisara and Robert Pinter “Some ethical hacking possibilities in
representatives approach digital protection more in a serious Kali Linux environment” Journal of Applied Technical and
way and they will be bound to learn - no assets, time or cash Educational Sciences JATES (2019), 129-149.
you spend for these exercises. [6] KaliLinux, "What is Kali Linux?,"
[https://docs.kali.org/introduction/what-is-kali-linux], Retrieved on:
CONCLUSION March 2018.
[7] G. Ahmed, M. Khan and M. Bashir, "A Linux-based IDPS using
The world of PC security is dynamically interconnected Snort" in Computer Fraud & Security(2015),13-18.
and continuously large in the context of using networks to [8] R. P. Karuparthi and B. Zhou, "Enhanced Approach to Detection of
perform essential transactions. Computerized bad behavior SQL Injection Attack," in Machine Learning and Applications
(ICMLA), 2016 15th IEEE International Conference on(2016), 466-
is diverting each new year along with different ways and 469.
means of security of information. While new computerized [9] R. W. Beggs, ”Mastering Kali Linux for advanced penetration
gadgets and vulnerabilities are becoming more and more testing” in Packt Publishing Ltd( 2014), 1-5.
evident, the latest and most important development [10] L. Allen, T. Heriyanto, and S. Ali, “Kali Linux–Assuring security by
propellers are trying to secure their installation, still a penetration testing” in Packt Publishing Ltd(2014), 1-12.
prerequisite for new stages and knowledge. There is no [11] Rupinder Cheema, Divya Bansal and Dr. Sanjeev Sofat,
“Deauthentication/Disassociation Attack: Implementation and
optimal response to continued infringement, however, we Security in Wireless Mesh Networks” in International Journal of
try to reduce our level to the best of our ability to be free Computer Applications(2011), Volume 23, 1-15.
from any potential danger on the web. [12] Gururaj Harinahalli Lokesh and Goutham BoreGowda, “Phishing
Website Detection Based on Effective Machine Learning Approach”
in Journal of Cyber Security Technology(2020), 1-14.
REFERENCES
[13] Cyberary. (2018). What Is Kali Linux and Why Do Hackers Use Kali
Linux OS - Cybrary.[online]Available at:
[1] Nithin kashyap, Hari raksha K. Malali and H. L Gururaj “Cyber https://www.cybrary.it/0p3n/kali-linux-hackers-use-kali linux-os/
Attacks and Security” in Soft Computing: Theories and [Accessed 4 Dec. 2018].
applications(2020), 895-904. [14] Netsniff-ng.org. (2018). netsniff-ng toolkit. online]
[2] RaviTeja Gaddam and M. Nandhini “An Analysis of Various Snort Available at: http://netsniff ng.org/ [Accessed 4 Dec. 2018].
Based Techniques to Detect and Prevent Intrusions in Networks” in [15] P. Services, (2018). What Is Network Security?. [online] Cisco.
International Conference on Inventive Communication and Available at: https://www.cisco.com/c/en/us/products/security/what-
Computational Technologies (2017), 1-15. is-network-security.html [Accessed 4 Dec. 2018].
[3] Teddy Surya Gunawan, Muhammad Kassim Lim, Nurul Fariza
Zulkurnain and Mira Kartiwi “On the Review and Setup of Security
Audit Using Kali Linux” in Indonesian Journal of Electrical
Engineering and Computer Science (2018), 51-59.
262
Authorized licensed use limited to: MANIPAL INSTITUTE OF TECHNOLOGY. Downloaded on November 09,2022 at 07:13:56 UTC from IEEE Xplore. Restrictions apply.
View publication stats