Essays about: "Kali"

Showing result 1 - 5 of 10 essays containing the word Kali.

  1. 1. Evaluating the Security and Resilience of Typical off the Shelf CoAP IoT Devices : Assessing CoAP and Wi-Fi vulnerabilities

    University essay from Mittuniversitetet/Institutionen för informationssystem och –teknologi

    Author : Wolfgang Müller; [2022]
    Keywords : IoT; DoS; CoAP; Ethical hacking; IoT; DoS; CoAP; Ethical hacking;

    Abstract : Syftet med denna studie har varit att utvärdera säkerheten och motståndskraften hos CoAP-protokollet som används av ett multinationellt företag för kommunikationen mellan en gateway och appen för kontroll av smarta produkter. Utvärderingen började med att koppla gatewayn till nätverket och installera operativsystemet Kali Linux på datorn. READ MORE

  2. 2. Web Penetration testing : Finding and evaluating vulnerabilities in a web page based on C#, .NET and Episerver

    University essay from KTH/Datavetenskap

    Author : Ameena Lundquist Amir; Ivan Khudur; [2022]
    Keywords : Ethical hacking; Penetration testing; Cybersecurity; DREAD; HTTP; HTTPS; Episerver; Kali Linux; Burp Suite; SQL injection; XSS; HTTP Method Tampering; Directory Traversal; HSTS; IDOR; Authentication; MFA;

    Abstract : Today’s society is highly dependent on functional and secure digital resources, to protect users and to deliver different kinds of services. To achieve this, it is important to evaluate the security of such resources, to find vulnerabilities and handle them before they are exploited. This study aimed to see if web applications based on C#, . READ MORE

  3. 3. The Failing Firm Defence: Are the Failing Firm Defence Criteria Formal Conditions or a Tool to Help Assess Overall Effects of a Merger?

    University essay from Lunds universitet/Juridiska institutionen; Lunds universitet/Juridiska fakulteten

    Author : Frosti Haraldsson; [2019]
    Keywords : Failing Firm Defence; Merger Control; Competition Law; Law and Political Science;

    Abstract : The failing firm defence is an exception to the underlying philosophy of merger control. When the failing firm defence is applied successfully mergers that have anti-competitive effects are approved, due to the fact that the competitive structure would deteriorate in a similar fashion in the absence of the merger. READ MORE

  4. 4. Investigating vulnerabilities in a home network with Kali Linux

    University essay from Mälardalens högskola/Akademin för innovation, design och teknik

    Author : Ashraf Hamadi; [2019]
    Keywords : vulnerabilities; home network; Kali Linux; Classification; network security;

    Abstract : The advancement of the internet across the globe has made computer users implement several ways of protection against possible network threats. The goal of this thesis is to analyse vulnerabilities and threats that may occur in a home network and design a vulnerability classification for home users with the help of Kali Linux. READ MORE

  5. 5. Management of Aided Construction Projects

    University essay from Lunds universitet/Utbildningar i Helsingborg

    Author : Sara Elofsson; [2015]
    Keywords : construction management; foreign aid support; tanzania; construction process; efficiency; improvements; Technology and Engineering;

    Abstract : Tanzania is a developing country standing in front of a lot of challenges. One of the biggest challenges, that this study considers, is the development of the construction management. In a time where the infrastructure and urbanization of the world is increasing it is important for developing countries such as Tanzania not to fall to far behind. READ MORE