IJSRP, Volume 14, Issue 6, June 2024 Edition [ISSN 2250-3153]
Dewan Juel Rahman, Al Amin Mahfuz, Most. Mithyla Zaman
Abstract:
The source of this work is Enterprise Cyber Security Management using Kali Linux and Scapy. Scapy is intended to be used to interpret a large number of protocols, transfer them over the network, accept them, include requests and answers, and much more. A larger percentage of the most difficult tasks, such as identification, vestige routing, probing, unit testing, raids, or network innovation, can be handled by this with ease. It also performs admirably at a plethora of other inelastic tasks that most other tools are unable to handle.