SlideShare a Scribd company logo
Presented by:
Mirza Taimoor Sultan Baig
Introduction
• Kali Linux is the most effective and widely used penetration testing tool in the world,
with penetration testers, forensics experts, reverse engineers, and vulnerability
assessors all using it.
• Kali Linux is a multi-platform solution that information security professionals and
hobbyists can use for free.
• Kali Linux includes a large number of resources for various information security
activities, including penetration testing, security research, computer forensics, and
reverse engineering.
Types of Software
There are two types of software
• Application software
• System software
Types of operating software
• Microsoft window
• Linix
• Unix
• Many more
Kali Linux Features
• More than600 penetration testing tools included
• Free (as in beer) and always will be
• Open Source Git tree
• FHS compliant
• Wide-ranging wireless device support
• Custom kernel, patched for injection
• Developed in a secure environment
• GPG signed packages and repositories
• Multi-language support
• Completely customizable
• ARMEL and ARMHF support
Should I Use Kali Linux?
Kali Linux is designed to meet the needs of penetration testing and security auditing
professionals. To accomplish this, Kali Linux has undergone a number of significant
changes to reflect these requirements:
Network services disabled by default :System hooks in Kali Linux disable network
services by default. These hooks allow us to install a variety of services on Kali Linux
while also ensuring that our distribution is stable by default, regardless of which
packages are installed. Additional networks, such as Bluetooth, are automatically
blacklisted.
Custom Linux kernel :Kali Linux makes use of an upstream kernel that has been
patched to enable wireless injection.
A minimal and trusted set of repositories: Given Kali Linux's priorities and objectives,
preserving the system's overall integrity is critical. With that in mind, the number of
upstream software sources used by Kali is held to a bare minimum. Many new Kali
users are tempted to expand their sources by adding more repositories. list, but you
run the risk of destroying your Kali Linux installation if you do so.
Hardware Required
• A minimum of 20GB disk space for the kalilinix
install.
• RAM for i386 and amd64 architectures, minimum 1GB
remmonded 2GB or more.
• CD-DVD Drive/USB boot support
Advantage and Disadvantage
Advantage
• The main disadvantage of kali linix is that is help us test penetrating legally, give us a
benefits to find out loop holes which serve as open entry points to our system.
• Basically helping us to safe than sorry.
• It is highly secure.
Disadvantage
• The disadvantage of this system is that it does not function like a normal OS and can not be
use as one.
• It gives a complete access an knowledge of penetration, that if not used wisely could have a
near disastrous effect.
Warning
• Use of these tools against a live website
for which you don’t have a permission , is
illegal and may land you in JAIL
IMPORTANT LAW
• 18 U.S. Code § 1029 -Fraud and related
activity in connection with access devices
• 18 U.S. Code § 1030 - Fraud and related
activity in connection with computers
kali linix

More Related Content

What's hot

Maemo 6 Platform Security
Maemo 6 Platform SecurityMaemo 6 Platform Security
Maemo 6 Platform Security
Peter Schneider
 
Secure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliverySecure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous Delivery
Black Duck by Synopsys
 
Product Spotlight: Red Hat Enterprise Linux for Servers and Desktops
Product Spotlight: Red Hat Enterprise Linux for Servers and DesktopsProduct Spotlight: Red Hat Enterprise Linux for Servers and Desktops
Product Spotlight: Red Hat Enterprise Linux for Servers and Desktops
Aventis Systems, Inc.
 
Kal i linux
Kal i linuxKal i linux
Kal i linux
shamsa222
 
Microservice et identité
Microservice et identitéMicroservice et identité
Microservice et identité
Leonard Moustacchis
 
Practical Steps to Scale Legal Support for Open Source
Practical Steps to Scale Legal Support for Open SourcePractical Steps to Scale Legal Support for Open Source
Practical Steps to Scale Legal Support for Open Source
Black Duck by Synopsys
 
PCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s MissingPCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s Missing
Black Duck by Synopsys
 
Attacking VPN's
Attacking VPN'sAttacking VPN's
Myths and Misperceptions of Open Source Security
Myths and Misperceptions of Open Source Security Myths and Misperceptions of Open Source Security
Myths and Misperceptions of Open Source Security
Black Duck by Synopsys
 
Vp ns
Vp nsVp ns
Integrating Black Duck into your Agile DevOps Environment
Integrating Black Duck into your Agile DevOps EnvironmentIntegrating Black Duck into your Agile DevOps Environment
Integrating Black Duck into your Agile DevOps Environment
Black Duck by Synopsys
 
NTXISSACSC3 - Critical Criteria for (Cloud) Workload Security by Steve Armend...
NTXISSACSC3 - Critical Criteria for (Cloud) Workload Security by Steve Armend...NTXISSACSC3 - Critical Criteria for (Cloud) Workload Security by Steve Armend...
NTXISSACSC3 - Critical Criteria for (Cloud) Workload Security by Steve Armend...
North Texas Chapter of the ISSA
 
Customer Case Study: ScienceLogic - Many Paths to Compliance
Customer Case Study: ScienceLogic - Many Paths to ComplianceCustomer Case Study: ScienceLogic - Many Paths to Compliance
Customer Case Study: ScienceLogic - Many Paths to Compliance
Black Duck by Synopsys
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Greater Noida Institute Of Technology
 
Security in the Age of Open Source
Security in the Age of Open SourceSecurity in the Age of Open Source
Security in the Age of Open Source
Black Duck by Synopsys
 
Contain your risk: Deploy secure containers with trust and confidence
Contain your risk: Deploy secure containers with trust and confidenceContain your risk: Deploy secure containers with trust and confidence
Contain your risk: Deploy secure containers with trust and confidence
Black Duck by Synopsys
 
Secure application deployment in Apache CloudStack
Secure application deployment in Apache CloudStackSecure application deployment in Apache CloudStack
Secure application deployment in Apache CloudStack
Tim Mackey
 
XML Interfaces to the popular Nessus Scanner
XML Interfaces to the popular Nessus ScannerXML Interfaces to the popular Nessus Scanner
XML Interfaces to the popular Nessus Scanner
Network Intelligence India
 
CSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami LaihoCSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami Laiho
NCCOMMS
 
CSF18 - The Night is Dark and Full of Hackers - Sami Laiho
CSF18 - The Night is Dark and Full of Hackers - Sami LaihoCSF18 - The Night is Dark and Full of Hackers - Sami Laiho
CSF18 - The Night is Dark and Full of Hackers - Sami Laiho
NCCOMMS
 

What's hot (20)

Maemo 6 Platform Security
Maemo 6 Platform SecurityMaemo 6 Platform Security
Maemo 6 Platform Security
 
Secure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliverySecure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous Delivery
 
Product Spotlight: Red Hat Enterprise Linux for Servers and Desktops
Product Spotlight: Red Hat Enterprise Linux for Servers and DesktopsProduct Spotlight: Red Hat Enterprise Linux for Servers and Desktops
Product Spotlight: Red Hat Enterprise Linux for Servers and Desktops
 
Kal i linux
Kal i linuxKal i linux
Kal i linux
 
Microservice et identité
Microservice et identitéMicroservice et identité
Microservice et identité
 
Practical Steps to Scale Legal Support for Open Source
Practical Steps to Scale Legal Support for Open SourcePractical Steps to Scale Legal Support for Open Source
Practical Steps to Scale Legal Support for Open Source
 
PCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s MissingPCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s Missing
 
Attacking VPN's
Attacking VPN'sAttacking VPN's
Attacking VPN's
 
Myths and Misperceptions of Open Source Security
Myths and Misperceptions of Open Source Security Myths and Misperceptions of Open Source Security
Myths and Misperceptions of Open Source Security
 
Vp ns
Vp nsVp ns
Vp ns
 
Integrating Black Duck into your Agile DevOps Environment
Integrating Black Duck into your Agile DevOps EnvironmentIntegrating Black Duck into your Agile DevOps Environment
Integrating Black Duck into your Agile DevOps Environment
 
NTXISSACSC3 - Critical Criteria for (Cloud) Workload Security by Steve Armend...
NTXISSACSC3 - Critical Criteria for (Cloud) Workload Security by Steve Armend...NTXISSACSC3 - Critical Criteria for (Cloud) Workload Security by Steve Armend...
NTXISSACSC3 - Critical Criteria for (Cloud) Workload Security by Steve Armend...
 
Customer Case Study: ScienceLogic - Many Paths to Compliance
Customer Case Study: ScienceLogic - Many Paths to ComplianceCustomer Case Study: ScienceLogic - Many Paths to Compliance
Customer Case Study: ScienceLogic - Many Paths to Compliance
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Security in the Age of Open Source
Security in the Age of Open SourceSecurity in the Age of Open Source
Security in the Age of Open Source
 
Contain your risk: Deploy secure containers with trust and confidence
Contain your risk: Deploy secure containers with trust and confidenceContain your risk: Deploy secure containers with trust and confidence
Contain your risk: Deploy secure containers with trust and confidence
 
Secure application deployment in Apache CloudStack
Secure application deployment in Apache CloudStackSecure application deployment in Apache CloudStack
Secure application deployment in Apache CloudStack
 
XML Interfaces to the popular Nessus Scanner
XML Interfaces to the popular Nessus ScannerXML Interfaces to the popular Nessus Scanner
XML Interfaces to the popular Nessus Scanner
 
CSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami LaihoCSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami Laiho
 
CSF18 - The Night is Dark and Full of Hackers - Sami Laiho
CSF18 - The Night is Dark and Full of Hackers - Sami LaihoCSF18 - The Night is Dark and Full of Hackers - Sami Laiho
CSF18 - The Night is Dark and Full of Hackers - Sami Laiho
 

Similar to kali linix

Kali linux os
Kali linux osKali linux os
Kali linux os
Samantha Lawrence
 
Operating system
Operating systemOperating system
Operating system
KartikeyBanjara1
 
linux.pptx
linux.pptxlinux.pptx
linux.pptx
AudieMarAgpawa
 
Kali presentation
Kali presentationKali presentation
Kali presentation
Zain Ul abadin
 
Kali linux.ppt
Kali linux.pptKali linux.ppt
Kali linux.ppt
Ahmedalhassar1
 
Kalilinux
KalilinuxKalilinux
Kalilinux
haha loser
 
Kali Linux
Kali LinuxKali Linux
Kali Linux
Shubham Agrawal
 
kali linux
kali linuxkali linux
kali linux
Darshan Dalwadi
 
Kali Linux
Kali LinuxKali Linux
Kali Linux
Sumit Singh
 
Kali Linux
Kali LinuxKali Linux
Kali Linux
Sumit Singh
 
Eliz seminar
Eliz seminar Eliz seminar
Eliz seminar
henelpj
 
Kali linux
Kali linuxKali linux
Kali linux
Harsh Gor
 
Unleash the Power: How to Install Kali Linux With a Twist
Unleash the Power: How to Install Kali Linux With a TwistUnleash the Power: How to Install Kali Linux With a Twist
Unleash the Power: How to Install Kali Linux With a Twist
FredReynolds2
 
Operating project
Operating projectOperating project
Operating project
ISMAT CH
 
Kali linux
Kali linuxKali linux
Kali linux
MaryamAlR
 
Kali linux summarised
Kali linux summarisedKali linux summarised
Kali linux summarised
Sanchit Srivastava
 
Infosecurity.be 2019: What are relevant open source security tools you should...
Infosecurity.be 2019: What are relevant open source security tools you should...Infosecurity.be 2019: What are relevant open source security tools you should...
Infosecurity.be 2019: What are relevant open source security tools you should...
B.A.
 
Kali Linux-Operating System Presentation.pptx
Kali Linux-Operating System Presentation.pptxKali Linux-Operating System Presentation.pptx
Kali Linux-Operating System Presentation.pptx
SumaiyaSinja1
 
Kali linux
Kali linuxKali linux
Kali linux
futaimbinlahej
 
Linux a free and open source operating system
Linux a free and open source operating systemLinux a free and open source operating system
Linux a free and open source operating system
banwait
 

Similar to kali linix (20)

Kali linux os
Kali linux osKali linux os
Kali linux os
 
Operating system
Operating systemOperating system
Operating system
 
linux.pptx
linux.pptxlinux.pptx
linux.pptx
 
Kali presentation
Kali presentationKali presentation
Kali presentation
 
Kali linux.ppt
Kali linux.pptKali linux.ppt
Kali linux.ppt
 
Kalilinux
KalilinuxKalilinux
Kalilinux
 
Kali Linux
Kali LinuxKali Linux
Kali Linux
 
kali linux
kali linuxkali linux
kali linux
 
Kali Linux
Kali LinuxKali Linux
Kali Linux
 
Kali Linux
Kali LinuxKali Linux
Kali Linux
 
Eliz seminar
Eliz seminar Eliz seminar
Eliz seminar
 
Kali linux
Kali linuxKali linux
Kali linux
 
Unleash the Power: How to Install Kali Linux With a Twist
Unleash the Power: How to Install Kali Linux With a TwistUnleash the Power: How to Install Kali Linux With a Twist
Unleash the Power: How to Install Kali Linux With a Twist
 
Operating project
Operating projectOperating project
Operating project
 
Kali linux
Kali linuxKali linux
Kali linux
 
Kali linux summarised
Kali linux summarisedKali linux summarised
Kali linux summarised
 
Infosecurity.be 2019: What are relevant open source security tools you should...
Infosecurity.be 2019: What are relevant open source security tools you should...Infosecurity.be 2019: What are relevant open source security tools you should...
Infosecurity.be 2019: What are relevant open source security tools you should...
 
Kali Linux-Operating System Presentation.pptx
Kali Linux-Operating System Presentation.pptxKali Linux-Operating System Presentation.pptx
Kali Linux-Operating System Presentation.pptx
 
Kali linux
Kali linuxKali linux
Kali linux
 
Linux a free and open source operating system
Linux a free and open source operating systemLinux a free and open source operating system
Linux a free and open source operating system
 

More from Mirza Baig

INVESTIGATING THE USE OF IMPEDANCE PLETHYSMOGRAPHY FOR DETECTING DECREASED BL...
INVESTIGATING THE USE OF IMPEDANCE PLETHYSMOGRAPHY FOR DETECTING DECREASED BL...INVESTIGATING THE USE OF IMPEDANCE PLETHYSMOGRAPHY FOR DETECTING DECREASED BL...
INVESTIGATING THE USE OF IMPEDANCE PLETHYSMOGRAPHY FOR DETECTING DECREASED BL...
Mirza Baig
 
Hemodynamic monitor by using IPG Technique
Hemodynamic monitor by using IPG TechniqueHemodynamic monitor by using IPG Technique
Hemodynamic monitor by using IPG Technique
Mirza Baig
 
BIOMEDICAL SENSORS.pptx
BIOMEDICAL SENSORS.pptxBIOMEDICAL SENSORS.pptx
BIOMEDICAL SENSORS.pptx
Mirza Baig
 
Fingerprint Recognition
Fingerprint RecognitionFingerprint Recognition
Fingerprint Recognition
Mirza Baig
 
Power Electronics
Power ElectronicsPower Electronics
Power Electronics
Mirza Baig
 
OPTICAL SENSORS AND THEIR APPLICATIONS
OPTICAL SENSORS AND THEIR APPLICATIONS	OPTICAL SENSORS AND THEIR APPLICATIONS
OPTICAL SENSORS AND THEIR APPLICATIONS
Mirza Baig
 
wireshark
wiresharkwireshark
wireshark
Mirza Baig
 
Power Electronics
Power Electronics Power Electronics
Power Electronics
Mirza Baig
 
GNU Radio
GNU RadioGNU Radio
GNU Radio
Mirza Baig
 
Automatic Solar Vertical Car Parking
Automatic Solar Vertical Car ParkingAutomatic Solar Vertical Car Parking
Automatic Solar Vertical Car Parking
Mirza Baig
 
state space modeling of electrical system
state space modeling of electrical systemstate space modeling of electrical system
state space modeling of electrical system
Mirza Baig
 
optical sensor
 optical sensor optical sensor
optical sensor
Mirza Baig
 
AUTOMATIC SOLAR VERTICAL CAR PARKING SYSTEM
      AUTOMATIC  SOLAR VERTICAL CAR PARKING SYSTEM      AUTOMATIC  SOLAR VERTICAL CAR PARKING SYSTEM
AUTOMATIC SOLAR VERTICAL CAR PARKING SYSTEM
Mirza Baig
 
A Comprehensive Analysis of Forearm Impedance Plethysmography for the Maximal...
A Comprehensive Analysis of Forearm Impedance Plethysmography for the Maximal...A Comprehensive Analysis of Forearm Impedance Plethysmography for the Maximal...
A Comprehensive Analysis of Forearm Impedance Plethysmography for the Maximal...
Mirza Baig
 
Determination of Cardiac Output based on Minimally Invasive Impedance Plethys...
Determination of Cardiac Output based on Minimally Invasive Impedance Plethys...Determination of Cardiac Output based on Minimally Invasive Impedance Plethys...
Determination of Cardiac Output based on Minimally Invasive Impedance Plethys...
Mirza Baig
 
BIO-ELECTRICAL IMPEDENCE PLETHYSMOGRAPHYDESIGNING AN EFFICIENT NON-INVASIVE E...
BIO-ELECTRICAL IMPEDENCE PLETHYSMOGRAPHYDESIGNING AN EFFICIENT NON-INVASIVE E...BIO-ELECTRICAL IMPEDENCE PLETHYSMOGRAPHYDESIGNING AN EFFICIENT NON-INVASIVE E...
BIO-ELECTRICAL IMPEDENCE PLETHYSMOGRAPHYDESIGNING AN EFFICIENT NON-INVASIVE E...
Mirza Baig
 
Development of an Adaptive Multi-sensor to Prevent Venous Stasis
Development of an Adaptive Multi-sensor to Prevent Venous StasisDevelopment of an Adaptive Multi-sensor to Prevent Venous Stasis
Development of an Adaptive Multi-sensor to Prevent Venous Stasis
Mirza Baig
 
Automatic digital-analog impedance plethysmography
Automatic digital-analog impedance plethysmographyAutomatic digital-analog impedance plethysmography
Automatic digital-analog impedance plethysmography
Mirza Baig
 
Automatic digital-analog impedance plethysmograph
Automatic digital-analog impedance plethysmographAutomatic digital-analog impedance plethysmograph
Automatic digital-analog impedance plethysmograph
Mirza Baig
 
Wearable Belt With Built-In Textile Electrodes for Cardio—Respiratory Monitor...
Wearable Belt With Built-In Textile Electrodes for Cardio—Respiratory Monitor...Wearable Belt With Built-In Textile Electrodes for Cardio—Respiratory Monitor...
Wearable Belt With Built-In Textile Electrodes for Cardio—Respiratory Monitor...
Mirza Baig
 

More from Mirza Baig (20)

INVESTIGATING THE USE OF IMPEDANCE PLETHYSMOGRAPHY FOR DETECTING DECREASED BL...
INVESTIGATING THE USE OF IMPEDANCE PLETHYSMOGRAPHY FOR DETECTING DECREASED BL...INVESTIGATING THE USE OF IMPEDANCE PLETHYSMOGRAPHY FOR DETECTING DECREASED BL...
INVESTIGATING THE USE OF IMPEDANCE PLETHYSMOGRAPHY FOR DETECTING DECREASED BL...
 
Hemodynamic monitor by using IPG Technique
Hemodynamic monitor by using IPG TechniqueHemodynamic monitor by using IPG Technique
Hemodynamic monitor by using IPG Technique
 
BIOMEDICAL SENSORS.pptx
BIOMEDICAL SENSORS.pptxBIOMEDICAL SENSORS.pptx
BIOMEDICAL SENSORS.pptx
 
Fingerprint Recognition
Fingerprint RecognitionFingerprint Recognition
Fingerprint Recognition
 
Power Electronics
Power ElectronicsPower Electronics
Power Electronics
 
OPTICAL SENSORS AND THEIR APPLICATIONS
OPTICAL SENSORS AND THEIR APPLICATIONS	OPTICAL SENSORS AND THEIR APPLICATIONS
OPTICAL SENSORS AND THEIR APPLICATIONS
 
wireshark
wiresharkwireshark
wireshark
 
Power Electronics
Power Electronics Power Electronics
Power Electronics
 
GNU Radio
GNU RadioGNU Radio
GNU Radio
 
Automatic Solar Vertical Car Parking
Automatic Solar Vertical Car ParkingAutomatic Solar Vertical Car Parking
Automatic Solar Vertical Car Parking
 
state space modeling of electrical system
state space modeling of electrical systemstate space modeling of electrical system
state space modeling of electrical system
 
optical sensor
 optical sensor optical sensor
optical sensor
 
AUTOMATIC SOLAR VERTICAL CAR PARKING SYSTEM
      AUTOMATIC  SOLAR VERTICAL CAR PARKING SYSTEM      AUTOMATIC  SOLAR VERTICAL CAR PARKING SYSTEM
AUTOMATIC SOLAR VERTICAL CAR PARKING SYSTEM
 
A Comprehensive Analysis of Forearm Impedance Plethysmography for the Maximal...
A Comprehensive Analysis of Forearm Impedance Plethysmography for the Maximal...A Comprehensive Analysis of Forearm Impedance Plethysmography for the Maximal...
A Comprehensive Analysis of Forearm Impedance Plethysmography for the Maximal...
 
Determination of Cardiac Output based on Minimally Invasive Impedance Plethys...
Determination of Cardiac Output based on Minimally Invasive Impedance Plethys...Determination of Cardiac Output based on Minimally Invasive Impedance Plethys...
Determination of Cardiac Output based on Minimally Invasive Impedance Plethys...
 
BIO-ELECTRICAL IMPEDENCE PLETHYSMOGRAPHYDESIGNING AN EFFICIENT NON-INVASIVE E...
BIO-ELECTRICAL IMPEDENCE PLETHYSMOGRAPHYDESIGNING AN EFFICIENT NON-INVASIVE E...BIO-ELECTRICAL IMPEDENCE PLETHYSMOGRAPHYDESIGNING AN EFFICIENT NON-INVASIVE E...
BIO-ELECTRICAL IMPEDENCE PLETHYSMOGRAPHYDESIGNING AN EFFICIENT NON-INVASIVE E...
 
Development of an Adaptive Multi-sensor to Prevent Venous Stasis
Development of an Adaptive Multi-sensor to Prevent Venous StasisDevelopment of an Adaptive Multi-sensor to Prevent Venous Stasis
Development of an Adaptive Multi-sensor to Prevent Venous Stasis
 
Automatic digital-analog impedance plethysmography
Automatic digital-analog impedance plethysmographyAutomatic digital-analog impedance plethysmography
Automatic digital-analog impedance plethysmography
 
Automatic digital-analog impedance plethysmograph
Automatic digital-analog impedance plethysmographAutomatic digital-analog impedance plethysmograph
Automatic digital-analog impedance plethysmograph
 
Wearable Belt With Built-In Textile Electrodes for Cardio—Respiratory Monitor...
Wearable Belt With Built-In Textile Electrodes for Cardio—Respiratory Monitor...Wearable Belt With Built-In Textile Electrodes for Cardio—Respiratory Monitor...
Wearable Belt With Built-In Textile Electrodes for Cardio—Respiratory Monitor...
 

Recently uploaded

Introduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.pptIntroduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.ppt
Dwarkadas J Sanghvi College of Engineering
 
Power Electronics- AC -AC Converters.pptx
Power Electronics- AC -AC Converters.pptxPower Electronics- AC -AC Converters.pptx
Power Electronics- AC -AC Converters.pptx
Poornima D
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
upoux
 
Ericsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.pptEricsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.ppt
wafawafa52
 
openshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoinopenshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoin
snaprevwdev
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICSUNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
vmspraneeth
 
Open Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surfaceOpen Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surface
Indrajeet sahu
 
smart pill dispenser is designed to improve medication adherence and safety f...
smart pill dispenser is designed to improve medication adherence and safety f...smart pill dispenser is designed to improve medication adherence and safety f...
smart pill dispenser is designed to improve medication adherence and safety f...
um7474492
 
Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...
pvpriya2
 
Unit -II Spectroscopy - EC I B.Tech.pdf
Unit -II Spectroscopy - EC  I B.Tech.pdfUnit -II Spectroscopy - EC  I B.Tech.pdf
Unit -II Spectroscopy - EC I B.Tech.pdf
TeluguBadi
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
upoux
 
Accident detection system project report.pdf
Accident detection system project report.pdfAccident detection system project report.pdf
Accident detection system project report.pdf
Kamal Acharya
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
aryanpankaj78
 
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
MadhavJungKarki
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
Paris Salesforce Developer Group
 
Bituminous road construction project based learning report
Bituminous road construction project based learning reportBituminous road construction project based learning report
Bituminous road construction project based learning report
CE19KaushlendraKumar
 
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
ijseajournal
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
ElakkiaU
 
FULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back EndFULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back End
PreethaV16
 

Recently uploaded (20)

Introduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.pptIntroduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.ppt
 
Power Electronics- AC -AC Converters.pptx
Power Electronics- AC -AC Converters.pptxPower Electronics- AC -AC Converters.pptx
Power Electronics- AC -AC Converters.pptx
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
 
Ericsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.pptEricsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.ppt
 
openshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoinopenshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoin
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICSUNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
 
Open Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surfaceOpen Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surface
 
smart pill dispenser is designed to improve medication adherence and safety f...
smart pill dispenser is designed to improve medication adherence and safety f...smart pill dispenser is designed to improve medication adherence and safety f...
smart pill dispenser is designed to improve medication adherence and safety f...
 
Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...
 
Unit -II Spectroscopy - EC I B.Tech.pdf
Unit -II Spectroscopy - EC  I B.Tech.pdfUnit -II Spectroscopy - EC  I B.Tech.pdf
Unit -II Spectroscopy - EC I B.Tech.pdf
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
 
Accident detection system project report.pdf
Accident detection system project report.pdfAccident detection system project report.pdf
Accident detection system project report.pdf
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
 
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
 
Bituminous road construction project based learning report
Bituminous road construction project based learning reportBituminous road construction project based learning report
Bituminous road construction project based learning report
 
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
 
FULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back EndFULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back End
 

kali linix

  • 2. Introduction • Kali Linux is the most effective and widely used penetration testing tool in the world, with penetration testers, forensics experts, reverse engineers, and vulnerability assessors all using it. • Kali Linux is a multi-platform solution that information security professionals and hobbyists can use for free. • Kali Linux includes a large number of resources for various information security activities, including penetration testing, security research, computer forensics, and reverse engineering.
  • 3. Types of Software There are two types of software • Application software • System software Types of operating software • Microsoft window • Linix • Unix • Many more
  • 4. Kali Linux Features • More than600 penetration testing tools included • Free (as in beer) and always will be • Open Source Git tree • FHS compliant • Wide-ranging wireless device support • Custom kernel, patched for injection • Developed in a secure environment • GPG signed packages and repositories • Multi-language support • Completely customizable • ARMEL and ARMHF support
  • 5. Should I Use Kali Linux? Kali Linux is designed to meet the needs of penetration testing and security auditing professionals. To accomplish this, Kali Linux has undergone a number of significant changes to reflect these requirements: Network services disabled by default :System hooks in Kali Linux disable network services by default. These hooks allow us to install a variety of services on Kali Linux while also ensuring that our distribution is stable by default, regardless of which packages are installed. Additional networks, such as Bluetooth, are automatically blacklisted. Custom Linux kernel :Kali Linux makes use of an upstream kernel that has been patched to enable wireless injection. A minimal and trusted set of repositories: Given Kali Linux's priorities and objectives, preserving the system's overall integrity is critical. With that in mind, the number of upstream software sources used by Kali is held to a bare minimum. Many new Kali
  • 6. users are tempted to expand their sources by adding more repositories. list, but you run the risk of destroying your Kali Linux installation if you do so.
  • 7. Hardware Required • A minimum of 20GB disk space for the kalilinix install. • RAM for i386 and amd64 architectures, minimum 1GB remmonded 2GB or more. • CD-DVD Drive/USB boot support
  • 8. Advantage and Disadvantage Advantage • The main disadvantage of kali linix is that is help us test penetrating legally, give us a benefits to find out loop holes which serve as open entry points to our system. • Basically helping us to safe than sorry. • It is highly secure. Disadvantage • The disadvantage of this system is that it does not function like a normal OS and can not be use as one. • It gives a complete access an knowledge of penetration, that if not used wisely could have a near disastrous effect.
  • 9.
  • 10.
  • 11. Warning • Use of these tools against a live website for which you don’t have a permission , is illegal and may land you in JAIL IMPORTANT LAW • 18 U.S. Code § 1029 -Fraud and related activity in connection with access devices • 18 U.S. Code § 1030 - Fraud and related activity in connection with computers