Kali Linux based Empirical Investigation on Vulnerability Evaluation using Pen-Testing tools

B Kumar, SP Bejo, R Kedia, P Banerjee… - … on Communication & …, 2023 - ieeexplore.ieee.org
Currently, because almost all interactions occur online, internet security is a critical concern.
Penetration testing evaluates network and system security while also revealing security …

Delving and Unveiling the Malicious World: Implementing Malware Analysis for Preventive Approach

SP Bejo, P Jha, B Kumar… - 2023 World Conference …, 2023 - ieeexplore.ieee.org
As technology advances, so do security concerns. Malware is one of the most dangerous
security dangers, spreading autonomously through user weaknesses or negligence …

Examining the Ethical Implications and Technical Capabilities of Key-logger Software

V Shukla, Y Shukla, A Patel - 2023 3rd International …, 2023 - ieeexplore.ieee.org
Key-logger software is widely used in both legal and illegal settings, which has led to
serious ethical issues with regard to privacy, cybersecurity, and digital monitoring. This …

Keylogger Development: Technical Aspects, Ethical Considerations, and Mitigation Strategies

NT Singh, A Shukla, A Nagar, K Arya… - … on Energy, Materials …, 2023 - ieeexplore.ieee.org
Keyloggers, software that records keystrokes on devices, have raised concerns about their
dual utility in lawful and illicit contexts. This study explores the intricate landscape of …

[PDF][PDF] LOW-COST ADVANCED UNDETECTABLE HARDWARE-BASED MALICIOUS KEYBOARD

K DIAZ - 2023 - scholarworks.calstate.edu
The widespread presence of peripheral devices in households, connecting to desktops and
laptops, creates a substantial security vulnerability. These devices can be manipulated at …