2. Content Page
1. What is Kali?
2. Development
3. Supported platforms
4. Features
5. Popular Culture
6. Security-focused operating system
3. What is Kali?
Kali Linux is a Debian-derived Linux
distribution designed for digital forensics
and penetration testing. It is maintained
and funded by Offensive Security Ltd. Mati
Aharoni, Devon Kearns and Raphaël
Hertzog are the core developers.
4. Development
Kali Linux is preinstalled with over 600 penetration-testing programs.
Kali Linux is based on Debian Jessie. Most packages Kali
uses are imported from the Debian repositories.
Kali Linux is developed in a secure location with only a small
number of trusted people that are allowed to commit
packages, with each package being signed by the developer.
5. Supported platforms
Kali Linux is distributed in 32- and 64-bit
images for use on hosts based on the x86
instruction set and as an image for the
ARM architecture for use on the
BeagleBoard computer and on Samsung's
ARM Chromebook.
6. Features
Kali Linux has a dedicated project set-
aside for compatibility and porting to
specific Android devices, called Kali Linux
NetHunter.
It is the first Open Source Android
penetration testing platform for Nexus
devices, created as a joint effort between
the Kali community member “BinkyBear”
and Offensive Security. It supports
Wireless 802.11 frame injection, one-click
MANA Evil Access Point setups, HID
keyboard (Teensy like attacks), as well as
Bad USB MITM attacks.
7. Popular Culture
The logo of Kali Linux appears on the
background in the activist and
cybersecurity related TV series Mr. Robot
(2015).
8. Security-focused
operating system
As such, something can be secure without being "security-focused." For
example, almost all of the operating systems mentioned here are faced with
security bug fixes in their lifetime; however, they all strive to consistently
approach all generic security flaws inherent in their design with new ideas in an
attempt to create a secure computing environment. Security-focused does not
mean security-evaluated operating system, which refers to operating systems
that have achieved certification from an external security-auditing organization.