{"title":"Kali Linux – a simple and effective way to study the level of cyber security and penetration testing of power electronic devices","authors":"Ivan Nedyalkov, Georgi Georgiev","doi":"10.59035/jmfy4876","DOIUrl":null,"url":null,"abstract":"The work presents the possibility to use Kali Linux in the process of power electronic devices research, which has not been applied before. Several of the built-in tools of Kali Linux have been used for the purpose of the research. Nmap has been used for vulnerability testing - scanning for open ports and finding out specific, well-known security vulnerabilities by using specific scripts. Wireshark and Burp Suite have been used to find out if the exchanged information is secure or not. hping3 has been used to scan for open ports and generating different TCP DoS attacks, thus studying what is the response of the power electronic device when it is subjected to different TCP DoS attacks – can it be accessed or not, has it experienced any performance violation, etc. Based on the results of this research, it can be argued that Kali Linux is applicable and can be used during the process of power electronic device research.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":null,"pages":null},"PeriodicalIF":1.0000,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal on Information Technologies and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.59035/jmfy4876","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
The work presents the possibility to use Kali Linux in the process of power electronic devices research, which has not been applied before. Several of the built-in tools of Kali Linux have been used for the purpose of the research. Nmap has been used for vulnerability testing - scanning for open ports and finding out specific, well-known security vulnerabilities by using specific scripts. Wireshark and Burp Suite have been used to find out if the exchanged information is secure or not. hping3 has been used to scan for open ports and generating different TCP DoS attacks, thus studying what is the response of the power electronic device when it is subjected to different TCP DoS attacks – can it be accessed or not, has it experienced any performance violation, etc. Based on the results of this research, it can be argued that Kali Linux is applicable and can be used during the process of power electronic device research.
这项工作提出了在电力电子设备研究过程中使用 Kali Linux 的可能性,而这在以前还没有应用过。Kali Linux 的几个内置工具已用于研究目的。Nmap 用于漏洞测试--使用特定脚本扫描开放端口并找出众所周知的特定安全漏洞。hping3 用于扫描开放端口并生成不同的 TCP DoS 攻击,从而研究电力电子设备在受到不同的 TCP DoS 攻击时的反应--能否被访问、是否出现任何性能故障等。根据这项研究的结果,可以认为 Kali Linux 是适用的,可以在电力电子设备研究过程中使用。