A RISK ASSESSMENT ON USAGE OF KALI TOOLS TO HACK AND MANIPULATE WEB-BASED MIS AND ERP APPLICATIONS
Abstract
Keywords
References
- Acumatica. (2021). Acumatica Security. https://www.acumatica.com/cloud-erp-software/security/
- Akhtar, Z. B., & Rawol, A. T. (2024). Uncovering cybersecurity vulnerabilities: A Kali Linux investigative exploration perspective. Sciendo.
- Alazmi, S., & De Leon, D. C. (2022). A systematic literature review on the characteristics and effectiveness of web application vulnerability scanners. IEEE Access, 10, 33200-33219.
- Alcorn, W. (2014). Beef-the browser exploitation framework project. https://beefproject.com/
- Alkhalaf, A., Alkhatib, B., & Ghanem, S. (2022, December). SQL Injection Attack Detection Using Machine Learning Techniques. In International Conference on Advanced Computing and Intelligent Engineering (pp. 145-156). Singapore: Springer Nature Singapore.
- Apache Software Foundation. (2017). CVE-2017-5638: Apache Struts 2 vulnerability. Retrieved from https://struts.apache.org/docs/s2-045.html
- Apache Struts. (2017, March 6). S2-045: Possible Remote Code Execution attack when using the Struts REST plugin with XStream handler to handle XML payloads. Apache Struts Announcements. https://struts.apache.org/announce#a20170306
- Bakry, B. M. B., Adenan, A. R. B., & Others. (2022). Security attack on IoT related devices using Raspberry Pi and Kali Linux. IEEE.
Details
Primary Language
English
Subjects
Information Security Management
Journal Section
Research Article
Authors
Ahmet Efe
*
0000-0002-2691-7517
Türkiye
Early Pub Date
June 22, 2025
Publication Date
June 30, 2025
Submission Date
January 30, 2025
Acceptance Date
June 10, 2025
Published in Issue
Year 2025 Volume: 11 Number: 1