SlideShare a Scribd company logo
1 of 21
Presented By:-
Gaikwad Milind B.
Hanwate Avinash M.
Guided By:-
Prof. Mrs J. M. Waghmare
A
SEMINAR ON
➢Introduction
➢History
➢Features
➢Kali’s New Features
➢Scheduling policy
➢Pro’s & Con’s
➢Applications
➢Conclusion
➢References
CONTENTS
➢Kali Linux is an advanced Penetration Testing and Security
Auditing Linux distribution (distro).
➢ Named after a Hindu goddess.
➢It was designed to replace the BackTrack 6 Linux distro.
➢Developed by Mati Aharoni (muts), Devon Kearns (dookie)
and, Raphaël Hertzog (bux) of Offensive Security.
➢UNIX > Linux > BackTrack > Kali.
INTRODUCTION
∗ 1968: E.W Dijkstra develops MULTICS (Multiplexed Information
and Computing Service) in the Netherlands
∗ 1969: Bell telephone (AT&T) lab researcher Ken Thompson
developed a new system using MULTICS as part of a team. His
coworker Brian Kernighan dubbed it UNICS (UNiplexed
Information and Computing Service). It was later changed to UNIX.
∗ Milestone: The UNIX operating system was born.
HISTORY
➢1969-1973: Bell Telephone researcher Dennis Richie develops the
C language as a systems programming language for UNIX.
➢1987: A Unix-like system based on microkernel design known as
MINIX was developed.
➢Milestone: C language developed.
HISTORY
➢1991:Linus Torvalds developed a new operating system called Linux, which
is similar to MINIX.
∗ 1990s-Today: Various UNIX and UNIX/Linux-like distributions are
released, such as: GNU, OS X, Debian, and Ubuntu.
∗ Milestone: Linux was born.
HISTORY
∗ 2006: Linux distribution BackTrack was released by Offensive Security. It
becomes the definitive Penetration Testing platform available.
∗ First version of Kali 1.0.0 was Released on 13th March, 2013.
∗ Latest version Kali 2.0 was released on 11th August, 2015.
∗ Milestones: BackTrack is born, then Kali.
HISTORY
➢Multilevel Queue Scheduler :
➢ Each queue associated with a priority.
➢ A process’s priority may be adjusted dynamically.
Two classes of processes :
1. Real-time processes
➢ always schedule highest priority processes
➢ FCFS (SCHED_FIFO) or RR (SCHED_RR) for
processes with same priority.
2. Normal processes ( priority with aging )
➢ RR for processes with same priority (SCHED_NORMAL)
➢ Aging is implemented efficiently.
SCHEDULING POLICIES
∗ 140 separate queues, one for each priority level
∗ Actually, two sets, active and expired
∗ Priorities 0-99 for real-time processes
∗ Priorities 100-139 for normal processes; value set via nice() system
call
PRIORITIES IN SCHEDULING
SCHEDULING CLASSES
∗ SCHED_FIFO: A First-In, First-Out real-time process. When the
scheduler assigns the CPU to the process, it leaves the process
descriptor in its current position in the run queue list. If no other
higher-priority real-time process is runnable, the process continues to
use the CPU as long as it wishes, even if other real-time processes that
have the same priority are runnable.
∗ SCHED_RR: Round Robin real-time process. When the scheduler
assigns the CPU to the process, it puts the process descriptor at the
end of the run queue list. This policy ensures a fair assignment of
CPU time to all SCHED_RR real-time processes that have the same
priority.
∗ SCHED_NORMAL: A conventional, time-shared process
Example
∗ Scenario: 2 programs: text editor and compiler are being executed.
∗ Text editor is an interactive program, so it has a higher dynamic priority
than the compiler. Nevertheless, it is often suspended, because the user
alternates between pauses for think time and data entry. The average delay
between two key presses is relatively long. However, as soon as the user
presses a key, an interrupt is raised and the kernel wakes up the text editor
process.
Example (cont.)
∗ The kernel determines that the dynamic priority of the editor is higher than
the priority of current, the currently running process (the compiler), so it
sets the TIF_NEED_RESCHED flag of this process, thus forcing the
scheduler to be activated when the kernel finishes handling the interrupt.
∗ The scheduler selects the editor and performs a process switch; as a result,
the execution of the editor is resumed very quickly and the character typed
by the user is echoed to the screen. When the character has been
processed, the text editor process suspends itself waiting for another key
press and the compiler process can resume its execution.
∗ It is freely available.
∗ 300+ applications, from password crackers to digital forensics software.
∗ Vast wireless device support (ARM processors).
∗ Completely Customizable.
∗ Multilingual Support.
∗ Secure Development Environment.
∗ Follows File system Hierarchy Standard (FHS).
FEATURES
∗ Switched from Ubuntu to Debian.
∗ Follows FHS and Debian .
∗ Can now bootstrap and customize Kali ISOs.
∗ Streaming security and package updates from Debian.
∗ Expanded ARM development.
∗ Easy upgrade to future versions.
∗ Long Term Tool Packaging and Maintenance.
KALI’S NEW FEATURES
∗ PRO’s:
1. With many Linux distros, you have access to free software which
numbers in the thousands!
2. Kali Linux is less vulnerable to computer malware!
3. Kali Linux is very stable!
∗ Con’s:
1. Many windows programs will not run in linux.
2. There is a smaller selection of peripheral hardware drivers for linux.
3. There is a learning curve for people who are new to linux.
PRO’s & CON’s
∗ Kali Linux is preinstalled with various penetration Testing programs
∗ nmap - port scanning, service and OS fingerprinting
∗ Wireshark - a packet analyzer.
∗ John The Ripper - a password cracker.
∗ Aircrack-ng – a software suite for penetration testing of wireless LANs.
∗ Hydra - Brute force password cracking tool.
∗ Maltego - Information on visualization & relationship analysis tool.
∗ Metasloit - Framework for developing and executing exploits.
∗ OWASP-ZAP – Integrated pen testing tool for web application.
∗ Sqlmap – Finds SQL injection flaws for taking over of database servers.
Applications
KALI’S TOOLKIT (300+!)
∗ Metasploit
∗ Nmap
∗ Wireshark
∗ Aircrack-ng
∗ John the Ripper
∗ CaseFile
∗ THC-Hydra
∗ Arduino
∗ diStorm3
∗ Sqlninja
∗ Proxy Strike
∗ Ghost Phisher
∗ CryptCat
∗ WebScarab
∗ Android-sdk
∗ Maskprocessor
∗ SIPArmyKnife
∗ FERN Wi-Fi Cracker
∗ Kali is the premier operating system for Penetration Testing and
other related uses.
∗ Kali was built from the ground up to replace BackTrack.
∗ There are many platforms and installation methods that are Kali-
compatible.
Conclusion
∗ http://www.kali.org
∗ http://www.offensive-security.com/
∗ Wikipedia. "BackTrack." Wikipedia. Wikimedia Foundation, 23 Sept.
2014. Web. 23 Sept. 2014.
∗ Aharoni, Mati. "Kali Linux | Rebirth of BackTrack, the Penetration
Testing Distribution." Kali Linux. Offensive Security, 25 Aug. 2014.
Web. 23 Sept. 2014.
∗ “Backtrack vs Kali." Diffen.com. Diffen LLC, n.d. Web. 23 Sep 2014.
REFERENCES
Thanks for listening!!!
Any Questions?

More Related Content

What's hot

Kernel Recipes 2015 - So you want to write a Linux driver framework
Kernel Recipes 2015 - So you want to write a Linux driver frameworkKernel Recipes 2015 - So you want to write a Linux driver framework
Kernel Recipes 2015 - So you want to write a Linux driver frameworkAnne Nicolas
 
RAFT Consensus Algorithm
RAFT Consensus AlgorithmRAFT Consensus Algorithm
RAFT Consensus Algorithmsangyun han
 
NetBSD and Linux for Embedded Systems
NetBSD and Linux for Embedded SystemsNetBSD and Linux for Embedded Systems
NetBSD and Linux for Embedded SystemsMahendra M
 
Realizing Linux Containers (LXC)
Realizing Linux Containers (LXC)Realizing Linux Containers (LXC)
Realizing Linux Containers (LXC)Boden Russell
 
Heterogeneous multiprocessing on androd and i.mx7
Heterogeneous multiprocessing on androd and i.mx7Heterogeneous multiprocessing on androd and i.mx7
Heterogeneous multiprocessing on androd and i.mx7Kynetics
 
FreeBSD and Drivers
FreeBSD and DriversFreeBSD and Drivers
FreeBSD and DriversKernel TLV
 
Asymmetric Multiprocessing - Kynetics ELC 2018 portland
Asymmetric Multiprocessing - Kynetics ELC 2018 portlandAsymmetric Multiprocessing - Kynetics ELC 2018 portland
Asymmetric Multiprocessing - Kynetics ELC 2018 portlandNicola La Gloria
 
How Linux Processes Your Network Packet - Elazar Leibovich
How Linux Processes Your Network Packet - Elazar LeibovichHow Linux Processes Your Network Packet - Elazar Leibovich
How Linux Processes Your Network Packet - Elazar LeibovichDevOpsDays Tel Aviv
 
Kernel Recipes 2016 - Landlock LSM: Unprivileged sandboxing
Kernel Recipes 2016 - Landlock LSM: Unprivileged sandboxingKernel Recipes 2016 - Landlock LSM: Unprivileged sandboxing
Kernel Recipes 2016 - Landlock LSM: Unprivileged sandboxingAnne Nicolas
 
AOS Lab 4: If you liked it, then you should have put a “lock” on it
AOS Lab 4: If you liked it, then you should have put a “lock” on itAOS Lab 4: If you liked it, then you should have put a “lock” on it
AOS Lab 4: If you liked it, then you should have put a “lock” on itZubair Nabi
 
Firewalld : A New Interface to Your Netfilter Stack
Firewalld : A New Interface to Your Netfilter StackFirewalld : A New Interface to Your Netfilter Stack
Firewalld : A New Interface to Your Netfilter StackMahmoud Shiri Varamini
 
DLM knowledge-sharing
DLM knowledge-sharingDLM knowledge-sharing
DLM knowledge-sharingEric Ren
 
Kernel Recipes 2016 - New hwmon device registration API - Jean Delvare
Kernel Recipes 2016 -  New hwmon device registration API - Jean DelvareKernel Recipes 2016 -  New hwmon device registration API - Jean Delvare
Kernel Recipes 2016 - New hwmon device registration API - Jean DelvareAnne Nicolas
 
Linux Locking Mechanisms
Linux Locking MechanismsLinux Locking Mechanisms
Linux Locking MechanismsKernel TLV
 
AOS Lab 8: Interrupts and Device Drivers
AOS Lab 8: Interrupts and Device DriversAOS Lab 8: Interrupts and Device Drivers
AOS Lab 8: Interrupts and Device DriversZubair Nabi
 
LISA15: systemd, the Next-Generation Linux System Manager
LISA15: systemd, the Next-Generation Linux System Manager LISA15: systemd, the Next-Generation Linux System Manager
LISA15: systemd, the Next-Generation Linux System Manager Alison Chaiken
 
Kernel Proc Connector and Containers
Kernel Proc Connector and ContainersKernel Proc Connector and Containers
Kernel Proc Connector and ContainersKernel TLV
 
OpenvSwitch Deep Dive
OpenvSwitch Deep DiveOpenvSwitch Deep Dive
OpenvSwitch Deep Diverajdeep
 

What's hot (20)

Kernel Recipes 2015 - So you want to write a Linux driver framework
Kernel Recipes 2015 - So you want to write a Linux driver frameworkKernel Recipes 2015 - So you want to write a Linux driver framework
Kernel Recipes 2015 - So you want to write a Linux driver framework
 
RAFT Consensus Algorithm
RAFT Consensus AlgorithmRAFT Consensus Algorithm
RAFT Consensus Algorithm
 
Making Linux do Hard Real-time
Making Linux do Hard Real-timeMaking Linux do Hard Real-time
Making Linux do Hard Real-time
 
NetBSD and Linux for Embedded Systems
NetBSD and Linux for Embedded SystemsNetBSD and Linux for Embedded Systems
NetBSD and Linux for Embedded Systems
 
Realizing Linux Containers (LXC)
Realizing Linux Containers (LXC)Realizing Linux Containers (LXC)
Realizing Linux Containers (LXC)
 
Heterogeneous multiprocessing on androd and i.mx7
Heterogeneous multiprocessing on androd and i.mx7Heterogeneous multiprocessing on androd and i.mx7
Heterogeneous multiprocessing on androd and i.mx7
 
FreeBSD and Drivers
FreeBSD and DriversFreeBSD and Drivers
FreeBSD and Drivers
 
Asymmetric Multiprocessing - Kynetics ELC 2018 portland
Asymmetric Multiprocessing - Kynetics ELC 2018 portlandAsymmetric Multiprocessing - Kynetics ELC 2018 portland
Asymmetric Multiprocessing - Kynetics ELC 2018 portland
 
How Linux Processes Your Network Packet - Elazar Leibovich
How Linux Processes Your Network Packet - Elazar LeibovichHow Linux Processes Your Network Packet - Elazar Leibovich
How Linux Processes Your Network Packet - Elazar Leibovich
 
Kernel Recipes 2016 - Landlock LSM: Unprivileged sandboxing
Kernel Recipes 2016 - Landlock LSM: Unprivileged sandboxingKernel Recipes 2016 - Landlock LSM: Unprivileged sandboxing
Kernel Recipes 2016 - Landlock LSM: Unprivileged sandboxing
 
AOS Lab 4: If you liked it, then you should have put a “lock” on it
AOS Lab 4: If you liked it, then you should have put a “lock” on itAOS Lab 4: If you liked it, then you should have put a “lock” on it
AOS Lab 4: If you liked it, then you should have put a “lock” on it
 
Firewalld : A New Interface to Your Netfilter Stack
Firewalld : A New Interface to Your Netfilter StackFirewalld : A New Interface to Your Netfilter Stack
Firewalld : A New Interface to Your Netfilter Stack
 
DLM knowledge-sharing
DLM knowledge-sharingDLM knowledge-sharing
DLM knowledge-sharing
 
Kernel Recipes 2016 - New hwmon device registration API - Jean Delvare
Kernel Recipes 2016 -  New hwmon device registration API - Jean DelvareKernel Recipes 2016 -  New hwmon device registration API - Jean Delvare
Kernel Recipes 2016 - New hwmon device registration API - Jean Delvare
 
Libpcap
LibpcapLibpcap
Libpcap
 
Linux Locking Mechanisms
Linux Locking MechanismsLinux Locking Mechanisms
Linux Locking Mechanisms
 
AOS Lab 8: Interrupts and Device Drivers
AOS Lab 8: Interrupts and Device DriversAOS Lab 8: Interrupts and Device Drivers
AOS Lab 8: Interrupts and Device Drivers
 
LISA15: systemd, the Next-Generation Linux System Manager
LISA15: systemd, the Next-Generation Linux System Manager LISA15: systemd, the Next-Generation Linux System Manager
LISA15: systemd, the Next-Generation Linux System Manager
 
Kernel Proc Connector and Containers
Kernel Proc Connector and ContainersKernel Proc Connector and Containers
Kernel Proc Connector and Containers
 
OpenvSwitch Deep Dive
OpenvSwitch Deep DiveOpenvSwitch Deep Dive
OpenvSwitch Deep Dive
 

Similar to Kali linux

Network Stack in Userspace (NUSE)
Network Stack in Userspace (NUSE)Network Stack in Userspace (NUSE)
Network Stack in Userspace (NUSE)Hajime Tazaki
 
Linux 开源操作系统发展新趋势
Linux 开源操作系统发展新趋势Linux 开源操作系统发展新趋势
Linux 开源操作系统发展新趋势Anthony Wong
 
Webinar: OpenEBS - Still Free and now FASTEST Kubernetes storage
Webinar: OpenEBS - Still Free and now FASTEST Kubernetes storageWebinar: OpenEBS - Still Free and now FASTEST Kubernetes storage
Webinar: OpenEBS - Still Free and now FASTEST Kubernetes storageMayaData Inc
 
Linux Kernel Security Overview - KCA 2009
Linux Kernel Security Overview - KCA 2009Linux Kernel Security Overview - KCA 2009
Linux Kernel Security Overview - KCA 2009James Morris
 
Performance analysis and troubleshooting using DTrace
Performance analysis and troubleshooting using DTracePerformance analysis and troubleshooting using DTrace
Performance analysis and troubleshooting using DTraceGraeme Jenkinson
 
LibOS as a regression test framework for Linux networking #netdev1.1
LibOS as a regression test framework for Linux networking #netdev1.1LibOS as a regression test framework for Linux networking #netdev1.1
LibOS as a regression test framework for Linux networking #netdev1.1Hajime Tazaki
 
Namespaces and cgroups - the basis of Linux containers
Namespaces and cgroups - the basis of Linux containersNamespaces and cgroups - the basis of Linux containers
Namespaces and cgroups - the basis of Linux containersKernel TLV
 
Sanger, upcoming Openstack for Bio-informaticians
Sanger, upcoming Openstack for Bio-informaticiansSanger, upcoming Openstack for Bio-informaticians
Sanger, upcoming Openstack for Bio-informaticiansPeter Clapham
 
Sanger OpenStack presentation March 2017
Sanger OpenStack presentation March 2017Sanger OpenStack presentation March 2017
Sanger OpenStack presentation March 2017Dave Holland
 
25 years of firewalls and network filtering - From antiquity to the cloud
25 years of firewalls and network filtering - From antiquity to the cloud25 years of firewalls and network filtering - From antiquity to the cloud
25 years of firewalls and network filtering - From antiquity to the cloudshira koper
 
LCNA14: Why Use Xen for Large Scale Enterprise Deployments? - Konrad Rzeszute...
LCNA14: Why Use Xen for Large Scale Enterprise Deployments? - Konrad Rzeszute...LCNA14: Why Use Xen for Large Scale Enterprise Deployments? - Konrad Rzeszute...
LCNA14: Why Use Xen for Large Scale Enterprise Deployments? - Konrad Rzeszute...The Linux Foundation
 
Project of deamon process
Project of deamon processProject of deamon process
Project of deamon processAbubakr Cheema
 
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...Alexandre Moneger
 
Tuning parallelcodeonsolaris005
Tuning parallelcodeonsolaris005Tuning parallelcodeonsolaris005
Tuning parallelcodeonsolaris005dflexer
 

Similar to Kali linux (20)

kali linux
kali linux kali linux
kali linux
 
Network Stack in Userspace (NUSE)
Network Stack in Userspace (NUSE)Network Stack in Userspace (NUSE)
Network Stack in Userspace (NUSE)
 
Linux 开源操作系统发展新趋势
Linux 开源操作系统发展新趋势Linux 开源操作系统发展新趋势
Linux 开源操作系统发展新趋势
 
Webinar: OpenEBS - Still Free and now FASTEST Kubernetes storage
Webinar: OpenEBS - Still Free and now FASTEST Kubernetes storageWebinar: OpenEBS - Still Free and now FASTEST Kubernetes storage
Webinar: OpenEBS - Still Free and now FASTEST Kubernetes storage
 
Linux Kernel Security Overview - KCA 2009
Linux Kernel Security Overview - KCA 2009Linux Kernel Security Overview - KCA 2009
Linux Kernel Security Overview - KCA 2009
 
Review of QNX
Review of QNXReview of QNX
Review of QNX
 
Performance analysis and troubleshooting using DTrace
Performance analysis and troubleshooting using DTracePerformance analysis and troubleshooting using DTrace
Performance analysis and troubleshooting using DTrace
 
LibOS as a regression test framework for Linux networking #netdev1.1
LibOS as a regression test framework for Linux networking #netdev1.1LibOS as a regression test framework for Linux networking #netdev1.1
LibOS as a regression test framework for Linux networking #netdev1.1
 
Namespaces and cgroups - the basis of Linux containers
Namespaces and cgroups - the basis of Linux containersNamespaces and cgroups - the basis of Linux containers
Namespaces and cgroups - the basis of Linux containers
 
Sanger, upcoming Openstack for Bio-informaticians
Sanger, upcoming Openstack for Bio-informaticiansSanger, upcoming Openstack for Bio-informaticians
Sanger, upcoming Openstack for Bio-informaticians
 
Flexible compute
Flexible computeFlexible compute
Flexible compute
 
운영체제론 Ch20
운영체제론 Ch20운영체제론 Ch20
운영체제론 Ch20
 
Vx works RTOS
Vx works RTOSVx works RTOS
Vx works RTOS
 
Sanger OpenStack presentation March 2017
Sanger OpenStack presentation March 2017Sanger OpenStack presentation March 2017
Sanger OpenStack presentation March 2017
 
25 years of firewalls and network filtering - From antiquity to the cloud
25 years of firewalls and network filtering - From antiquity to the cloud25 years of firewalls and network filtering - From antiquity to the cloud
25 years of firewalls and network filtering - From antiquity to the cloud
 
LCNA14: Why Use Xen for Large Scale Enterprise Deployments? - Konrad Rzeszute...
LCNA14: Why Use Xen for Large Scale Enterprise Deployments? - Konrad Rzeszute...LCNA14: Why Use Xen for Large Scale Enterprise Deployments? - Konrad Rzeszute...
LCNA14: Why Use Xen for Large Scale Enterprise Deployments? - Konrad Rzeszute...
 
Project of deamon process
Project of deamon processProject of deamon process
Project of deamon process
 
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...
 
Real time Linux
Real time LinuxReal time Linux
Real time Linux
 
Tuning parallelcodeonsolaris005
Tuning parallelcodeonsolaris005Tuning parallelcodeonsolaris005
Tuning parallelcodeonsolaris005
 

Recently uploaded

UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Christo Ananth
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 

Recently uploaded (20)

UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 

Kali linux

  • 1. Presented By:- Gaikwad Milind B. Hanwate Avinash M. Guided By:- Prof. Mrs J. M. Waghmare A SEMINAR ON
  • 2. ➢Introduction ➢History ➢Features ➢Kali’s New Features ➢Scheduling policy ➢Pro’s & Con’s ➢Applications ➢Conclusion ➢References CONTENTS
  • 3. ➢Kali Linux is an advanced Penetration Testing and Security Auditing Linux distribution (distro). ➢ Named after a Hindu goddess. ➢It was designed to replace the BackTrack 6 Linux distro. ➢Developed by Mati Aharoni (muts), Devon Kearns (dookie) and, Raphaël Hertzog (bux) of Offensive Security. ➢UNIX > Linux > BackTrack > Kali. INTRODUCTION
  • 4. ∗ 1968: E.W Dijkstra develops MULTICS (Multiplexed Information and Computing Service) in the Netherlands ∗ 1969: Bell telephone (AT&T) lab researcher Ken Thompson developed a new system using MULTICS as part of a team. His coworker Brian Kernighan dubbed it UNICS (UNiplexed Information and Computing Service). It was later changed to UNIX. ∗ Milestone: The UNIX operating system was born. HISTORY
  • 5. ➢1969-1973: Bell Telephone researcher Dennis Richie develops the C language as a systems programming language for UNIX. ➢1987: A Unix-like system based on microkernel design known as MINIX was developed. ➢Milestone: C language developed. HISTORY
  • 6. ➢1991:Linus Torvalds developed a new operating system called Linux, which is similar to MINIX. ∗ 1990s-Today: Various UNIX and UNIX/Linux-like distributions are released, such as: GNU, OS X, Debian, and Ubuntu. ∗ Milestone: Linux was born. HISTORY
  • 7. ∗ 2006: Linux distribution BackTrack was released by Offensive Security. It becomes the definitive Penetration Testing platform available. ∗ First version of Kali 1.0.0 was Released on 13th March, 2013. ∗ Latest version Kali 2.0 was released on 11th August, 2015. ∗ Milestones: BackTrack is born, then Kali. HISTORY
  • 8. ➢Multilevel Queue Scheduler : ➢ Each queue associated with a priority. ➢ A process’s priority may be adjusted dynamically. Two classes of processes : 1. Real-time processes ➢ always schedule highest priority processes ➢ FCFS (SCHED_FIFO) or RR (SCHED_RR) for processes with same priority. 2. Normal processes ( priority with aging ) ➢ RR for processes with same priority (SCHED_NORMAL) ➢ Aging is implemented efficiently. SCHEDULING POLICIES
  • 9. ∗ 140 separate queues, one for each priority level ∗ Actually, two sets, active and expired ∗ Priorities 0-99 for real-time processes ∗ Priorities 100-139 for normal processes; value set via nice() system call PRIORITIES IN SCHEDULING
  • 10. SCHEDULING CLASSES ∗ SCHED_FIFO: A First-In, First-Out real-time process. When the scheduler assigns the CPU to the process, it leaves the process descriptor in its current position in the run queue list. If no other higher-priority real-time process is runnable, the process continues to use the CPU as long as it wishes, even if other real-time processes that have the same priority are runnable.
  • 11. ∗ SCHED_RR: Round Robin real-time process. When the scheduler assigns the CPU to the process, it puts the process descriptor at the end of the run queue list. This policy ensures a fair assignment of CPU time to all SCHED_RR real-time processes that have the same priority. ∗ SCHED_NORMAL: A conventional, time-shared process
  • 12. Example ∗ Scenario: 2 programs: text editor and compiler are being executed. ∗ Text editor is an interactive program, so it has a higher dynamic priority than the compiler. Nevertheless, it is often suspended, because the user alternates between pauses for think time and data entry. The average delay between two key presses is relatively long. However, as soon as the user presses a key, an interrupt is raised and the kernel wakes up the text editor process.
  • 13. Example (cont.) ∗ The kernel determines that the dynamic priority of the editor is higher than the priority of current, the currently running process (the compiler), so it sets the TIF_NEED_RESCHED flag of this process, thus forcing the scheduler to be activated when the kernel finishes handling the interrupt. ∗ The scheduler selects the editor and performs a process switch; as a result, the execution of the editor is resumed very quickly and the character typed by the user is echoed to the screen. When the character has been processed, the text editor process suspends itself waiting for another key press and the compiler process can resume its execution.
  • 14. ∗ It is freely available. ∗ 300+ applications, from password crackers to digital forensics software. ∗ Vast wireless device support (ARM processors). ∗ Completely Customizable. ∗ Multilingual Support. ∗ Secure Development Environment. ∗ Follows File system Hierarchy Standard (FHS). FEATURES
  • 15. ∗ Switched from Ubuntu to Debian. ∗ Follows FHS and Debian . ∗ Can now bootstrap and customize Kali ISOs. ∗ Streaming security and package updates from Debian. ∗ Expanded ARM development. ∗ Easy upgrade to future versions. ∗ Long Term Tool Packaging and Maintenance. KALI’S NEW FEATURES
  • 16. ∗ PRO’s: 1. With many Linux distros, you have access to free software which numbers in the thousands! 2. Kali Linux is less vulnerable to computer malware! 3. Kali Linux is very stable! ∗ Con’s: 1. Many windows programs will not run in linux. 2. There is a smaller selection of peripheral hardware drivers for linux. 3. There is a learning curve for people who are new to linux. PRO’s & CON’s
  • 17. ∗ Kali Linux is preinstalled with various penetration Testing programs ∗ nmap - port scanning, service and OS fingerprinting ∗ Wireshark - a packet analyzer. ∗ John The Ripper - a password cracker. ∗ Aircrack-ng – a software suite for penetration testing of wireless LANs. ∗ Hydra - Brute force password cracking tool. ∗ Maltego - Information on visualization & relationship analysis tool. ∗ Metasloit - Framework for developing and executing exploits. ∗ OWASP-ZAP – Integrated pen testing tool for web application. ∗ Sqlmap – Finds SQL injection flaws for taking over of database servers. Applications
  • 18. KALI’S TOOLKIT (300+!) ∗ Metasploit ∗ Nmap ∗ Wireshark ∗ Aircrack-ng ∗ John the Ripper ∗ CaseFile ∗ THC-Hydra ∗ Arduino ∗ diStorm3 ∗ Sqlninja ∗ Proxy Strike ∗ Ghost Phisher ∗ CryptCat ∗ WebScarab ∗ Android-sdk ∗ Maskprocessor ∗ SIPArmyKnife ∗ FERN Wi-Fi Cracker
  • 19. ∗ Kali is the premier operating system for Penetration Testing and other related uses. ∗ Kali was built from the ground up to replace BackTrack. ∗ There are many platforms and installation methods that are Kali- compatible. Conclusion
  • 20. ∗ http://www.kali.org ∗ http://www.offensive-security.com/ ∗ Wikipedia. "BackTrack." Wikipedia. Wikimedia Foundation, 23 Sept. 2014. Web. 23 Sept. 2014. ∗ Aharoni, Mati. "Kali Linux | Rebirth of BackTrack, the Penetration Testing Distribution." Kali Linux. Offensive Security, 25 Aug. 2014. Web. 23 Sept. 2014. ∗ “Backtrack vs Kali." Diffen.com. Diffen LLC, n.d. Web. 23 Sep 2014. REFERENCES