DEVELOPMENT USES AND IMPACT OF OFFENSIVE SECURITY TOOLKIT: A PRACTICALAND ANALYTICAL APPROACH / WALEED AHMED ; SUPERVİSOR, DR. DOKUN IWALEWA OLUWAJANA
Dil: İngilizce 2024Tanım: 106 sheets; +1 CD ROM 30 cmİçerik türü:- text
- unmediated
- volume
Materyal türü | Geçerli Kütüphane | Koleksiyon | Yer Numarası | Kopya numarası | Durum | Notlar | İade tarihi | Barkod | Materyal Ayırtmaları | |
---|---|---|---|---|---|---|---|---|---|---|
Thesis | CIU LIBRARY Depo | Tez Koleksiyonu | YL 3337 A36 2024 (Rafa gözat(Aşağıda açılır)) | C.1 | Kullanılabilir | Information Technologies | T3754 | |||
Suppl. CD | CIU LIBRARY Görsel İşitsel | Tez Koleksiyonu | YL 3337 A36 2024 (Rafa gözat(Aşağıda açılır)) | C.1 | Kullanılabilir | Information Technologies | CDT3754 |
CIU LIBRARY raflarına göz atılıyor, Raftaki konumu: Depo, Koleksiyon: Tez Koleksiyonu Raf tarayıcısını kapatın(Raf tarayıcısını kapatır)
Thesis (MSc) - Cyprus International University. Institute of Graduate Studies and Research Information Technologies
The project's goal is to offer a comprehensive offensive toolkit that includes keylogging, malware generation, backdoor installation, Mac address spoofing, and website vulnerability analysis. The toolkit fills the requirement for offensive cybersecurity tools that users of different skill levels may employ and that are easily accessible using Kali Linux Python programming. Unlike other options like "TheFatRat" and "Veil," which complicate use, this toolkit combines functionalities into a single package, eliminating the need for additional tools like Metasploit. The program aims to improve users' comprehension of cybersecurity risks and mitigating measures by emphasizing both instructional and practical aspects. The document, which promotes a thorough cybersecurity plan, emphasizes the significance of both offensive and defensive methods. It emphasizes how common it is for users to be ignorant of malware activity, highlighting how important it is to fully understand attack tactics to achieve comprehensive cybersecurity. By giving customers, a comprehensive understanding of offensive tactics, the study seeks to close the cybersecurity awareness gap by equipping them to identify and neutralize dangerous malware. This toolkit was made to promote awareness, education, and experimentation in the cybersecurity community. The proclamation recognizes the unbalanced defensive-offensive balance brought about by the profusion of defensive capabilities at one's disposal and the dearth of support for offensive cybersecurity techniques. Although system security still requires defensive procedures, preventing cyberattacks also requires knowledge of aggressive strategies. The report also emphasizes how quickly technology is developing and how a thorough understanding of offensive strategies is required to address emerging cybersecurity threats. The importance of customers being aware of cybersecurity dangers is underscored by the fact that a large number of consumers remain ignorant of the presence and actions of harmful software on their devices. By offering a thorough toolkit for offensive cybersecurity operations, the project ultimately seeks to increase cybersecurity expertise.