Examination of Different Network Security Monitoring Tools

1Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This article examines how black hat hackers use different hacking tools to hack into a system and gain access. Data is collected from OWASP top 10 and other websites which show the cyberattacks and the increase in the number of cyberattacks in the years 2021 and 2022. Using this data, some of the most occurred attacks like SQL injection, authentication bypass, eaves dropping, website hacking, DDOS attack, man-in-the-middle attack, malware, spyware, keyloggers, etc. were obtained. So, this paper discusses some of the important cybersecurity tools, and from these tools, it is easy to prevent such cyberattacks in the future. The first section illustrates the methodology of hacking, i.e., how black hat hacker hacks a system in five different steps, and in the following sections, some information gathering tools are explained. Using HTTrack, it is easy to clone the whole website in a system, can see each and every file in the local desktop and can easily find vulnerabilities, and it is easy to do fishing attack using this tool. The second tool is Maltego, which is one of the best tools used by black hat hackers to gather information. Next is Nmap also known as Network mapper, from which it is easy to gather all the information such as which operating system is the victim using open ports, closed ports, filtered ports, and services the victim machine is running on; using this, it is easy to hack into the victim machine. How Wireshark is used for sniffing, and how it is easy to see all the data traveling from source to destination are then summarized. Thereafter, how website hacking is done using Burp Suite, how Bettercap is used as man-in-the-middle attack, how black hat hackers create back door using msfvenom, and how the target machine is exploited using Metasploit are elaborated.

Cite

CITATION STYLE

APA

Maaz, S., Sinha, D. K., & Sinha, G. (2023). Examination of Different Network Security Monitoring Tools. In Lecture Notes on Data Engineering and Communications Technologies (Vol. 166, pp. 653–666). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-981-99-0835-6_47

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free