

It is used to track the packets so that each one is filtered to meet our specific needs. Recon‐ng has modules, database interaction, and built‐in functions to help cybersecurity professionals gather information.Wireshark is an open-source packet analyzer, which is used for education, analysis, software development, communication protocol development, and network troubleshooting. When cybersecurity professionals launches Sparta, after the initial NMAP scan and some data collection, it proceeds to run additional tools against the discovered services such as nikto, smbenum, snmpcheck, and more. The chapter discusses some of the tools in Kali Linux, namely NMAP, Burp, Wireshark, Social Engineer Toolkit, and Metasploit Framework-but there are so many more. security auditing and specifically geared toward security specialists. It is specifically built to meet the requirements of. It remains free and contains more than 600 penetration tools with a wide range of wireless device support. Kali Linux debuted in 2013 as a total rewrite of the free Linux distribution called BackTrack. This chapter helps the cybersecurity professionals to understand virtualization, Kali Linux, optimizing Kali Linux, and using Kali Linux tools. In addition, the accumulated results (i.e., before, during, and after the attack) could be used for the analysis of large-scale DDoS.


The simulation results in terms of the number of packets and average packet per second indicate the cyber security level of organizations against DDoS attacks. Two organizations of Pakistan have been chosen to analyze their behavior. For the DDoS attack, TCP flooding is chosen to analyze the behavior of organizations in three aspects (i) before attack, (ii) during attack, and (iii) after attack. We have conducted the distributed-denial-of-service (DDoS) attack using Wireshark and LOIC. The idea is to improve security by highlighting the behavior of attacks (i.e., gaps, weak points, and solutions) to control the crimes. The main objective of this research is to measure the level of security and analyze the behavior of cyber-attack via Information and communications technology. The ongoing research in the field of cybersecurity is therefore playing an important role and a huge impact on society. The digital environment of cyber society is being affected by intruders, cybercriminals, and neighboring countries.
