Ethical Hacking Tools: Security Analysis of Kali Linux, BackBox, etc.

Verified

Added on  2023/05/27

|6
|966
|194
Report
AI Summary
This report provides an overview of several ethical hacking tools, including Kali Linux, BlackBox, Metasploit, and Parrot Security, detailing their advantages and security features. Kali Linux, with its extensive collection of security tools, is highlighted for its streamlined interface and potential for resolving system issues, though its security is not considered robust out-of-the-box and requires hardening. BlackBox is presented as a tool for penetration testing and vulnerability assessment, along with its forensic capabilities and resource efficiency. Metasploit is emphasized for its ability to evade detection systems and execute remote attacks. Parrot Security is noted for its preinstalled Anonsurf feature and workspace management. The report concludes by discussing the trustworthiness of open-source tools, citing dedicated coders, transparency, and speedy updates as key factors. References to relevant research papers are also included.
Document Page
Running head: ETHICAL HACKING
Ethical Hacking
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Table of Contents
Kali Linux..................................................................................................................................2
Advantage of using this tool..................................................................................................2
How secure is the tool............................................................................................................2
BlackBox....................................................................................................................................2
Advantage of using this tool..................................................................................................2
How Secure is the tool...........................................................................................................3
Metasploit...................................................................................................................................3
Advantage of using this tool..................................................................................................3
How secure is the tool............................................................................................................3
Parrot Security........................................................................................................................3
Security..................................................................................................................................4
The open source tools are trustable............................................................................................4
Reference:..................................................................................................................................5
Document Page
Kali Linux
Advantage of using this tool
The main reason of using Kali Linux for ethical hacking are as follows: -
There are over 300 security tools present in the Kali Linux system (Allen, Heriyanto
and Ali 2014). The tool interface has been streamlined. Backtracking tools are also
removed. This insists that the security system is very robust in nature
Kali Linux also has the potential of removing the issues that are present in the system.
During testing the performing the ethical hacking, the loops that are found can be
resolved in the system
Kali Linux is a free software. This is the main reason that the usage of Kali Linux is
very popular.
How secure is the tool
Kali Linux is not considered to be safe. Using Kali Linux out of the box as the primary
operating system is not desirable. Hardening of the operating system with the help of the
sysadmin skill is required for increasing the robustness.
BlackBox
Advantage of using this tool
Advantage of using BackBox are as follows: -
BackBox is used for penetration testing and vulnerability assessment (Papernot et al.
2017). With the help of the vulnerability assessment, security measures cab be taken.
this will help in increasing the security of the web application.
Forensic is introduced to the BackBox which helps in supporting the mobile analysis.
Document Page
Backbox provides maximum performance with limited usage of resources. In case of
ethical hacking if there are limited resources, BackBox can be the ultimate option that
can be implemented
How Secure is the tool
The security auditing options are extensive in nature. This leads to the fact that the
management of the project will get performed in a better and robust manner. Provisioning of
the checking the local network integrity increases the robustness of BackBox.
Metasploit
Advantage of using this tool
Advantages of using Microsoft Ignite are as follows: -
1. Evade detection system. Metasploit is used for better detection of the security systems
that are present (Bullock and Parker 2017). With the help of this security vulnerability
scans can be performed. this helps in detection of the issues that are present in the
platform. This helps in increasing the robustness of the system.
2. Executing remote attacks is one of the main reason Ethical hackers use this platform.
With the help of the remote attacks, ethical hacking can be performed in an innovated
manner
How secure is the tool
Security of the tool is very high. This is the main reason that this system is used for ethical
hacking
Parrot Security
Advantages of using Parrot Security for ethical hacking are as follows: -
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1. Anonsurf is preinstalled in the Parrot security, this helps in hooding of the ethical
hackers (Hooper et al. 2016). This is the reason that the ethical hackers mostly use
Parrot Security for hacking purposes.
2. Workspace managers are well managed. This helps in better screen sharing. This
aspect also enhances multi-tasking. This performing of multi-tasking helps in better
management of the hacking process
Security
Security of Parrot Security is very robust. Parrot Security is always updated and is fully
sandboxed. The entire system is always under control.
The open source tools are trustable
The major reasons that decides that open source tools are trustable are as follows: -
1. There are dedicated coders who have already tested the software that is using the open
source platform. This reduces the chance of getting attacked by imposters.
2. High rate of transparency is provided to the system as per the management of the
system. The security vendors are well aware of the existing issues and hence risk
mitigation steps can be taken
3. The updates that are provided are also speedy. This leads to the fact that the imposters
cannot gain access to the software with much ease.
Document Page
Reference:
Allen, L., Heriyanto, T. and Ali, S., 2014. Kali Linux–Assuring security by penetration
testing. Packt Publishing Ltd.
Bullock, J. and Parker, J.T., 2017. Wireshark for Security Professionals: Using Wireshark
and the Metasploit Framework. John Wiley & Sons.
Hooper, M., Tian, Y., Zhou, R., Cao, B., Lauf, A.P., Watkins, L., Robinson, W.H. and
Alexis, W., 2016, November. Securing commercial wifi-based uavs from common security
attacks. In Military Communications Conference, MILCOM 2016-2016 IEEE (pp. 1213-
1218). IEEE.
Papernot, N., McDaniel, P., Goodfellow, I., Jha, S., Celik, Z.B. and Swami, A., 2017, April.
Practical black-box attacks against machine learning. In Proceedings of the 2017 ACM on
Asia Conference on Computer and Communications Security (pp. 506-519). ACM.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]