Presented by:
Mirza Taimoor Sultan Baig
Introduction
• Kali Linux is the most effective and widely used penetration testing tool in the world,
with penetration testers, forensics experts, reverse engineers, and vulnerability
assessors all using it.
• Kali Linux is a multi-platform solution that information security professionals and
hobbyists can use for free.
• Kali Linux includes a large number of resources for various information security
activities, including penetration testing, security research, computer forensics, and
reverse engineering.
Types of Software
There are two types of software
• Application software
• System software
Types of operating software
• Microsoft window
• Linix
• Unix
• Many more
Kali Linux Features
• More than600 penetration testing tools included
• Free (as in beer) and always will be
• Open Source Git tree
• FHS compliant
• Wide-ranging wireless device support
• Custom kernel, patched for injection
• Developed in a secure environment
• GPG signed packages and repositories
• Multi-language support
• Completely customizable
• ARMEL and ARMHF support
Should I Use Kali Linux?
Kali Linux is designed to meet the needs of penetration testing and security auditing
professionals. To accomplish this, Kali Linux has undergone a number of significant
changes to reflect these requirements:
Network services disabled by default :System hooks in Kali Linux disable network
services by default. These hooks allow us to install a variety of services on Kali Linux
while also ensuring that our distribution is stable by default, regardless of which
packages are installed. Additional networks, such as Bluetooth, are automatically
blacklisted.
Custom Linux kernel :Kali Linux makes use of an upstream kernel that has been
patched to enable wireless injection.
A minimal and trusted set of repositories: Given Kali Linux's priorities and objectives,
preserving the system's overall integrity is critical. With that in mind, the number of
upstream software sources used by Kali is held to a bare minimum. Many new Kali
users are tempted to expand their sources by adding more repositories. list, but you
run the risk of destroying your Kali Linux installation if you do so.
Hardware Required
• A minimum of 20GB disk space for the kalilinix
install.
• RAM for i386 and amd64 architectures, minimum 1GB
remmonded 2GB or more.
• CD-DVD Drive/USB boot support
Advantage and Disadvantage
Advantage
• The main disadvantage of kali linix is that is help us test penetrating legally, give us a
benefits to find out loop holes which serve as open entry points to our system.
• Basically helping us to safe than sorry.
• It is highly secure.
Disadvantage
• The disadvantage of this system is that it does not function like a normal OS and can not be
use as one.
• It gives a complete access an knowledge of penetration, that if not used wisely could have a
near disastrous effect.
Warning
• Use of these tools against a live website
for which you don’t have a permission , is
illegal and may land you in JAIL
IMPORTANT LAW
• 18 U.S. Code § 1029 -Fraud and related
activity in connection with access devices
• 18 U.S. Code § 1030 - Fraud and related
activity in connection with computers
kali linix

kali linix

  • 1.
  • 2.
    Introduction • Kali Linuxis the most effective and widely used penetration testing tool in the world, with penetration testers, forensics experts, reverse engineers, and vulnerability assessors all using it. • Kali Linux is a multi-platform solution that information security professionals and hobbyists can use for free. • Kali Linux includes a large number of resources for various information security activities, including penetration testing, security research, computer forensics, and reverse engineering.
  • 3.
    Types of Software Thereare two types of software • Application software • System software Types of operating software • Microsoft window • Linix • Unix • Many more
  • 4.
    Kali Linux Features •More than600 penetration testing tools included • Free (as in beer) and always will be • Open Source Git tree • FHS compliant • Wide-ranging wireless device support • Custom kernel, patched for injection • Developed in a secure environment • GPG signed packages and repositories • Multi-language support • Completely customizable • ARMEL and ARMHF support
  • 5.
    Should I UseKali Linux? Kali Linux is designed to meet the needs of penetration testing and security auditing professionals. To accomplish this, Kali Linux has undergone a number of significant changes to reflect these requirements: Network services disabled by default :System hooks in Kali Linux disable network services by default. These hooks allow us to install a variety of services on Kali Linux while also ensuring that our distribution is stable by default, regardless of which packages are installed. Additional networks, such as Bluetooth, are automatically blacklisted. Custom Linux kernel :Kali Linux makes use of an upstream kernel that has been patched to enable wireless injection. A minimal and trusted set of repositories: Given Kali Linux's priorities and objectives, preserving the system's overall integrity is critical. With that in mind, the number of upstream software sources used by Kali is held to a bare minimum. Many new Kali
  • 6.
    users are temptedto expand their sources by adding more repositories. list, but you run the risk of destroying your Kali Linux installation if you do so.
  • 7.
    Hardware Required • Aminimum of 20GB disk space for the kalilinix install. • RAM for i386 and amd64 architectures, minimum 1GB remmonded 2GB or more. • CD-DVD Drive/USB boot support
  • 8.
    Advantage and Disadvantage Advantage •The main disadvantage of kali linix is that is help us test penetrating legally, give us a benefits to find out loop holes which serve as open entry points to our system. • Basically helping us to safe than sorry. • It is highly secure. Disadvantage • The disadvantage of this system is that it does not function like a normal OS and can not be use as one. • It gives a complete access an knowledge of penetration, that if not used wisely could have a near disastrous effect.
  • 11.
    Warning • Use ofthese tools against a live website for which you don’t have a permission , is illegal and may land you in JAIL IMPORTANT LAW • 18 U.S. Code § 1029 -Fraud and related activity in connection with access devices • 18 U.S. Code § 1030 - Fraud and related activity in connection with computers