Research Article

A RISK ASSESSMENT ON USAGE OF KALI TOOLS TO HACK AND MANIPULATE WEB-BASED MIS AND ERP APPLICATIONS

Volume: 11 Number: 1 June 30, 2025
TR EN

A RISK ASSESSMENT ON USAGE OF KALI TOOLS TO HACK AND MANIPULATE WEB-BASED MIS AND ERP APPLICATIONS

Abstract

The increasing reliance on web-based Management Information Systems (MIS) and Enterprise Resource Planning (ERP) applications has made them an attractive target for cyber attackers. This study conducts a comprehensive risk assessment of the use of Kali Linux tools in hacking and manipulating web-based MIS and ERP applications. By examining key penetration testing methodologies—including reconnaissance, scanning, enumeration, exploitation, and post-exploitation—this research highlights the vulnerabilities inherent in these systems. The study provides an in-depth analysis of prominent Kali Linux tools such as SQLMap, Burp Suite, Metasploit Framework, Nmap, and Nessus, which are commonly used for security testing but also pose significant risks when leveraged for malicious activities. Drawing on case studies and existing literature, the findings underscore the critical security gaps in web-based MIS and ERP applications, emphasizing the need for robust defense mechanisms. The study proposes proactive risk mitigation strategies, including regular security audits, implementation of least privilege access controls, security awareness training, deployment of advanced threat detection systems, and adherence to legal and compliance frameworks governing penetration testing. The research concludes that while Kali Linux serves as a valuable tool for ethical hacking and security assessments, its misuse with the support of AI algorithms and automated code generations of scanning and attacks necessitates a stringent cybersecurity framework to protect organizational assets. Future research should explore the integration of automated threat detection systems and the legal implications of penetration testing to enhance cybersecurity resilience.

Keywords

References

  1. Acumatica. (2021). Acumatica Security. https://www.acumatica.com/cloud-erp-software/security/
  2. Akhtar, Z. B., & Rawol, A. T. (2024). Uncovering cybersecurity vulnerabilities: A Kali Linux investigative exploration perspective. Sciendo.
  3. Alazmi, S., & De Leon, D. C. (2022). A systematic literature review on the characteristics and effectiveness of web application vulnerability scanners. IEEE Access, 10, 33200-33219.
  4. Alcorn, W. (2014). Beef-the browser exploitation framework project. https://beefproject.com/
  5. Alkhalaf, A., Alkhatib, B., & Ghanem, S. (2022, December). SQL Injection Attack Detection Using Machine Learning Techniques. In International Conference on Advanced Computing and Intelligent Engineering (pp. 145-156). Singapore: Springer Nature Singapore.
  6. Apache Software Foundation. (2017). CVE-2017-5638: Apache Struts 2 vulnerability. Retrieved from https://struts.apache.org/docs/s2-045.html
  7. Apache Struts. (2017, March 6). S2-045: Possible Remote Code Execution attack when using the Struts REST plugin with XStream handler to handle XML payloads. Apache Struts Announcements. https://struts.apache.org/announce#a20170306
  8. Bakry, B. M. B., Adenan, A. R. B., & Others. (2022). Security attack on IoT related devices using Raspberry Pi and Kali Linux. IEEE.

Details

Primary Language

English

Subjects

Information Security Management

Journal Section

Research Article

Early Pub Date

June 22, 2025

Publication Date

June 30, 2025

Submission Date

January 30, 2025

Acceptance Date

June 10, 2025

Published in Issue

Year 2025 Volume: 11 Number: 1

APA
Efe, A. (2025). A RISK ASSESSMENT ON USAGE OF KALI TOOLS TO HACK AND MANIPULATE WEB-BASED MIS AND ERP APPLICATIONS. Yönetim Bilişim Sistemleri Dergisi, 11(1), 62-80. https://izlik.org/JA79NJ93CK
AMA
1.Efe A. A RISK ASSESSMENT ON USAGE OF KALI TOOLS TO HACK AND MANIPULATE WEB-BASED MIS AND ERP APPLICATIONS. Yönetim Bilişim Sistemleri Dergisi. 2025;11(1):62-80. https://izlik.org/JA79NJ93CK
Chicago
Efe, Ahmet. 2025. “A RISK ASSESSMENT ON USAGE OF KALI TOOLS TO HACK AND MANIPULATE WEB-BASED MIS AND ERP APPLICATIONS”. Yönetim Bilişim Sistemleri Dergisi 11 (1): 62-80. https://izlik.org/JA79NJ93CK.
EndNote
Efe A (June 1, 2025) A RISK ASSESSMENT ON USAGE OF KALI TOOLS TO HACK AND MANIPULATE WEB-BASED MIS AND ERP APPLICATIONS. Yönetim Bilişim Sistemleri Dergisi 11 1 62–80.
IEEE
[1]A. Efe, “A RISK ASSESSMENT ON USAGE OF KALI TOOLS TO HACK AND MANIPULATE WEB-BASED MIS AND ERP APPLICATIONS”, Yönetim Bilişim Sistemleri Dergisi, vol. 11, no. 1, pp. 62–80, June 2025, [Online]. Available: https://izlik.org/JA79NJ93CK
ISNAD
Efe, Ahmet. “A RISK ASSESSMENT ON USAGE OF KALI TOOLS TO HACK AND MANIPULATE WEB-BASED MIS AND ERP APPLICATIONS”. Yönetim Bilişim Sistemleri Dergisi 11/1 (June 1, 2025): 62-80. https://izlik.org/JA79NJ93CK.
JAMA
1.Efe A. A RISK ASSESSMENT ON USAGE OF KALI TOOLS TO HACK AND MANIPULATE WEB-BASED MIS AND ERP APPLICATIONS. Yönetim Bilişim Sistemleri Dergisi. 2025;11:62–80.
MLA
Efe, Ahmet. “A RISK ASSESSMENT ON USAGE OF KALI TOOLS TO HACK AND MANIPULATE WEB-BASED MIS AND ERP APPLICATIONS”. Yönetim Bilişim Sistemleri Dergisi, vol. 11, no. 1, June 2025, pp. 62-80, https://izlik.org/JA79NJ93CK.
Vancouver
1.Ahmet Efe. A RISK ASSESSMENT ON USAGE OF KALI TOOLS TO HACK AND MANIPULATE WEB-BASED MIS AND ERP APPLICATIONS. Yönetim Bilişim Sistemleri Dergisi [Internet]. 2025 Jun. 1;11(1):62-80. Available from: https://izlik.org/JA79NJ93CK