Kali Linux has over 600 tools for penetration testing, which on the other hand could also be 600 plus tools a hacker can use in a malicious way.
Choose one of tools from the list
List Here
or both are same links
– Must be in APA format
- (1 pg) Title Page
- (1 pg) Abstract (individual page)
- (1 pg) Body – Has a header related to the content to follow.
- Provide a summary and documentation of the exercise. The body 2-page minimum provide 4 screenshots.
- Conclusion – Share thoughts on the exercise, research, and other information
- (1 pg) References – 2 minimum
Make sure it is not Plagiarized
I need Presentation (PPT)
As a group create presentation and powerpoint to share your research.
- Choose 1 of the penetration tools
- With a minimum of 10 slides provides:
- Summary background
- How it’s used as a tool
- How hackers use it
- How to protect against it.