Riona Maria Varghese,
Neeraja Anil,
Nidhin Anil,
Nikhil John Jose,
Arun Madhu,
Justin Mathew,
- Student, Department of Computer Science and Engineering, Saintgits College of Engineering, Pathamuttom, Kerala, India
- Student, Department of Computer Science and Engineering, Saintgits College of Engineering, Pathamuttom, Kerala, India
- Student, Department of Computer Science and Engineering, Saintgits College of Engineering, Pathamuttom, Kerala, India
- Student, Department of Computer Science and Engineering, Saintgits College of Engineering, Pathamuttom, Kerala, India
- Associate Professor, Department of Computer Science and Engineering, Saintgits College of Engineering, Pathamuttom, Kerala, India
- Associate Professor, Department of Computer Science and Engineering, Saintgits College of Engineering, Pathamuttom, Kerala, India
Abstract
In the ever-evolving field of cybersecurity, the need for accessible and user-friendly tools in favor of beginner users has never been greater. The existing ethical hacking-related operating systems, while powerful, often overwhelm beginners with their complexity. The main objective of this project is to bridge the gap by providing an operating system for novice cyber enthusiasts looking to explore the world of ethical hacking and security. The proposed operating system will provide informative and user-friendly applications that simulate different attacks such as XSS attacks, SQL injection, Wi-Fi attacks, and Distributed Denial-of-Service (DDoS) attacks, thereby allowing the users to gain hands-on experience of the same. The app will be developed using the PyQt6 framework for the frontend, with Firebase serving as the backend. The operating system is created using Linux From Scratch to provide a minimal system with only the needed tools. The applications provide a brief tutorial on what each attack is, what type of weakness it depends on, and what exploits are possible. It also introduces the user to a few common sets of tools that are used for exploiting these attacks. As a unique learning platform, our operating system focuses on simplicity and aims to be a stepping stone for absolute beginners to be able to solidify their foundations and navigate through the field of cybersecurity with ease and confidence.
Keywords: Cybersecurity, education, ethical hacking, operating system, Linux
[This article belongs to Journal of Open Source Developments ]
Riona Maria Varghese, Neeraja Anil, Nidhin Anil, Nikhil John Jose, Arun Madhu, Justin Mathew. Securix: An Open-Source Security-based Linux Distribution for Novice Cyber Security Enthusiasts. Journal of Open Source Developments. 2024; 11(03):1-6.
Riona Maria Varghese, Neeraja Anil, Nidhin Anil, Nikhil John Jose, Arun Madhu, Justin Mathew. Securix: An Open-Source Security-based Linux Distribution for Novice Cyber Security Enthusiasts. Journal of Open Source Developments. 2024; 11(03):1-6. Available from: https://journals.stmjournals.com/joosd/article=2024/view=180883
References
- Shrivastava P, Jamal MS, Kataoka K. EvilScout: Detection and mitigation of evil twin attack in SDN enabled WiFi. IEEE Trans Netw Serv Manag. 2020;17:89–102. DOI: 10.1109/TNSM.2020.2972774.
- Rodríguez GE, Torres JG, Flores P, Benavides DE. Cross-site scripting (XSS) attacks and mitigation: A survey. Comput Netw. 2020;166:106960. DOI: 10.1016/j.comnet.2019.106960.
- Crespo-Martínez IS, Campazas-Vega A, Guerrero-Higueras ÁM, Riego-DelCastillo V, Álvarez-Aparicio C, Fernández-Llamas C. SQL injection attack detection in network flow data. Comput Secur. 2023;127:103093. DOI: 10.1016/j.cose.2023.103093.
- Balarezo JF, Wang S, Chavez KG, Al-Hourani A, Kandeepan S. A survey on DoS/DDoS attacks mathematical modelling for traditional, SDN and virtual networks. Eng Sci Technol Int J. 2022;31:101065. DOI: 10.1016/j.jestch.2021.09.011.
- Kali Linux. (2024). Should I Use Kali Linux? Kali Linux Documentation. [online] Kali Linux. Available from: https://www.kali.org/docs/introduction/should-i-use-kali-linux/
- Riverbank Computing. (2024). What is PyQt? Introduction. [online] Available from: https://riverbankcomputing.com/software/pyqt/intro
- Gupta S, Gupta BB. Cross-Site Scripting (XSS) attacks and defense mechanisms: Classification and state-of-the-art. Int J Syst Assur Eng Manag. 2017;8:512–530. DOI: 10.1007/s13198-015-0376-0.
- Halbouni A, Ong LY, Leow MC. Wireless security protocols WPA3: A systematic literature review. IEEE Access. 2023;11:112438–112450. DOI: 10.1109/ACCESS.2023.3322931.
- Anonymous. (2014). BlackArch Linux – Penetration Testing Distribution. [online] Hacking Reviews. Available from: https://www.hacking.reviews/2017/09/blackarch-linux-penetration-testing.html
- Linux From Scratch (LFS). (2024). Welcome to Linux From Scratch! [online] Available from: https://www.linuxfromscratch.org/

Journal of Open Source Developments
| Volume | 11 |
| Issue | 03 |
| Received | 03/06/2024 |
| Accepted | 15/10/2024 |
| Published | 04/11/2024 |
Login
PlumX Metrics
