3. ➢Kali Linux is an advanced Penetration Testing and Security
Auditing Linux distribution (distro).
➢ Named after a Hindu goddess.
➢It was designed to replace the BackTrack 6 Linux distro.
➢Developed by Mati Aharoni (muts), Devon Kearns (dookie)
and, Raphaël Hertzog (bux) of Offensive Security.
➢UNIX > Linux > BackTrack > Kali.
INTRODUCTION
4. ∗ 1968: E.W Dijkstra develops MULTICS (Multiplexed Information
and Computing Service) in the Netherlands
∗ 1969: Bell telephone (AT&T) lab researcher Ken Thompson
developed a new system using MULTICS as part of a team. His
coworker Brian Kernighan dubbed it UNICS (UNiplexed
Information and Computing Service). It was later changed to UNIX.
∗ Milestone: The UNIX operating system was born.
HISTORY
5. ➢1969-1973: Bell Telephone researcher Dennis Richie develops the
C language as a systems programming language for UNIX.
➢1987: A Unix-like system based on microkernel design known as
MINIX was developed.
➢Milestone: C language developed.
HISTORY
6. ➢1991:Linus Torvalds developed a new operating system called Linux, which
is similar to MINIX.
∗ 1990s-Today: Various UNIX and UNIX/Linux-like distributions are
released, such as: GNU, OS X, Debian, and Ubuntu.
∗ Milestone: Linux was born.
HISTORY
7. ∗ 2006: Linux distribution BackTrack was released by Offensive Security. It
becomes the definitive Penetration Testing platform available.
∗ First version of Kali 1.0.0 was Released on 13th March, 2013.
∗ Latest version Kali 2.0 was released on 11th August, 2015.
∗ Milestones: BackTrack is born, then Kali.
HISTORY
8. ➢Multilevel Queue Scheduler :
➢ Each queue associated with a priority.
➢ A process’s priority may be adjusted dynamically.
Two classes of processes :
1. Real-time processes
➢ always schedule highest priority processes
➢ FCFS (SCHED_FIFO) or RR (SCHED_RR) for
processes with same priority.
2. Normal processes ( priority with aging )
➢ RR for processes with same priority (SCHED_NORMAL)
➢ Aging is implemented efficiently.
SCHEDULING POLICIES
9. ∗ 140 separate queues, one for each priority level
∗ Actually, two sets, active and expired
∗ Priorities 0-99 for real-time processes
∗ Priorities 100-139 for normal processes; value set via nice() system
call
PRIORITIES IN SCHEDULING
10. SCHEDULING CLASSES
∗ SCHED_FIFO: A First-In, First-Out real-time process. When the
scheduler assigns the CPU to the process, it leaves the process
descriptor in its current position in the run queue list. If no other
higher-priority real-time process is runnable, the process continues to
use the CPU as long as it wishes, even if other real-time processes that
have the same priority are runnable.
11. ∗ SCHED_RR: Round Robin real-time process. When the scheduler
assigns the CPU to the process, it puts the process descriptor at the
end of the run queue list. This policy ensures a fair assignment of
CPU time to all SCHED_RR real-time processes that have the same
priority.
∗ SCHED_NORMAL: A conventional, time-shared process
12. Example
∗ Scenario: 2 programs: text editor and compiler are being executed.
∗ Text editor is an interactive program, so it has a higher dynamic priority
than the compiler. Nevertheless, it is often suspended, because the user
alternates between pauses for think time and data entry. The average delay
between two key presses is relatively long. However, as soon as the user
presses a key, an interrupt is raised and the kernel wakes up the text editor
process.
13. Example (cont.)
∗ The kernel determines that the dynamic priority of the editor is higher than
the priority of current, the currently running process (the compiler), so it
sets the TIF_NEED_RESCHED flag of this process, thus forcing the
scheduler to be activated when the kernel finishes handling the interrupt.
∗ The scheduler selects the editor and performs a process switch; as a result,
the execution of the editor is resumed very quickly and the character typed
by the user is echoed to the screen. When the character has been
processed, the text editor process suspends itself waiting for another key
press and the compiler process can resume its execution.
14. ∗ It is freely available.
∗ 300+ applications, from password crackers to digital forensics software.
∗ Vast wireless device support (ARM processors).
∗ Completely Customizable.
∗ Multilingual Support.
∗ Secure Development Environment.
∗ Follows File system Hierarchy Standard (FHS).
FEATURES
15. ∗ Switched from Ubuntu to Debian.
∗ Follows FHS and Debian .
∗ Can now bootstrap and customize Kali ISOs.
∗ Streaming security and package updates from Debian.
∗ Expanded ARM development.
∗ Easy upgrade to future versions.
∗ Long Term Tool Packaging and Maintenance.
KALI’S NEW FEATURES
16. ∗ PRO’s:
1. With many Linux distros, you have access to free software which
numbers in the thousands!
2. Kali Linux is less vulnerable to computer malware!
3. Kali Linux is very stable!
∗ Con’s:
1. Many windows programs will not run in linux.
2. There is a smaller selection of peripheral hardware drivers for linux.
3. There is a learning curve for people who are new to linux.
PRO’s & CON’s
17. ∗ Kali Linux is preinstalled with various penetration Testing programs
∗ nmap - port scanning, service and OS fingerprinting
∗ Wireshark - a packet analyzer.
∗ John The Ripper - a password cracker.
∗ Aircrack-ng – a software suite for penetration testing of wireless LANs.
∗ Hydra - Brute force password cracking tool.
∗ Maltego - Information on visualization & relationship analysis tool.
∗ Metasloit - Framework for developing and executing exploits.
∗ OWASP-ZAP – Integrated pen testing tool for web application.
∗ Sqlmap – Finds SQL injection flaws for taking over of database servers.
Applications
19. ∗ Kali is the premier operating system for Penetration Testing and
other related uses.
∗ Kali was built from the ground up to replace BackTrack.
∗ There are many platforms and installation methods that are Kali-
compatible.
Conclusion
20. ∗ http://www.kali.org
∗ http://www.offensive-security.com/
∗ Wikipedia. "BackTrack." Wikipedia. Wikimedia Foundation, 23 Sept.
2014. Web. 23 Sept. 2014.
∗ Aharoni, Mati. "Kali Linux | Rebirth of BackTrack, the Penetration
Testing Distribution." Kali Linux. Offensive Security, 25 Aug. 2014.
Web. 23 Sept. 2014.
∗ “Backtrack vs Kali." Diffen.com. Diffen LLC, n.d. Web. 23 Sep 2014.
REFERENCES