Abstract

Many operating systems are used for ethical hacking, which has emerged over the years. These operating systems have multiple tools and features to encounter malicious attacks performed by hackers. This study aims to discuss the benefits of various operating systems used for ethical hacking and to present a platform comparison study of two well-known Debian-derived Linux distributions used for ethical hacking, namely Kali Linux and Parrot OS. These tools and features assist ethical hackers in determining which operating system is best for penetration testing. In this paper, we will explore what penetration testing is, why we use this testing technique and how to secure the computer and the network from cyber-attacks using different ethical hacking operating systems. The paper deals with a qualitative analysis of the tools and features to deeply analyze some of their metrics which have been common in these operating systems. This paper will help ethical hackers to nail down the operating systems that are most suitable for them.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call