SlideShare a Scribd company logo
Presented By
Harsh Gor
Deep Chothani
The Birth of KALI LINUX
• Kali Linux is a Debian-based Linux distribution
aimed at advanced Penetration Testing and
Security Auditing. Kali contains several hundred
tools aimed at various Information Security tasks,
such as Penetration Testing, Forensics and
Reverse Engineering.
• Kali Linux is Developed, Funded and Maintained
by Offensive Security, a leading information
security training company.
• Kali Linux was released on the 13th March, 2013
as a complete rebuild of BackTrack Linux.
What is KALI LINUX?
• Kali Linux is an Advanced Penetration Testing and
Security Auditing Linux distribution.
• Kali Linux is Named after a Hindu goddess.
• Developed by Mati Aharoni (muts), Devon
Kearns (dookie) and, Raphaël Hertzog (bux) of
Offensive Security.
Kali Linux Core Developers
Mati Aharoni (muts) is the
lead Kali developer, trainer
and founder of Offensive
Security. With over 10 years
of experience as a
professional penetration
tester, Mati has uncovered
several major security flaws
and is actively involved in the
offensive security arena.
Mati Aharoni :
Devon Kearns (dookie) is an
Offensive Security instructor,
Kali Linux developer, the
administrator of the Exploit
Database, co-creator of the
Metasploit Unleashed project,
fanatic, and co-author of
Metasploit: The Penetration
Tester’s Guide.
Devon Kearns :
Raphaël Hertzog (bux) is an
experienced Debian
developer and consultant,
author of the well known
Debian Administrator’s
Handbook. He’s the packaging
wizard in team and manages
continuously growing
development infrastructure.
Raphaël Hertzog :
More About KALI LINUX…
• Open Source
• Developed in a secure environment.
• Available in 32-bit and 64-bit images.
• It’s first version of Kali 1.0.0 was Released on
13th March, 2013.
• It’s newest version Kali 2.0 was released on
11th August, 2015.
• Free and always will be.
Features of KALI LINUX
• Completely customizable.
• 600+ Applications, from Password crackers to
Digital Forensics software.
• Multi Language Support.
• Vast Wireless device support and Compatible
with USB.
• Switched from Ubuntu to Debian.
• Easy upgrade to future versions.
What is Penetration Testing?
“The process of evaluating Systems, Applications,
and Protocols with the intent of identifying
loopholes usually from the viewpoint of an
anonymous user to determine potential real
world impacts…”
Or in other words
…we try to break into stuff before the bad guys do…
Flexibility of KALI LINUX
• Kali Linux can run natively when installed on a
computer’s hard disk or,
• It can be booted from a live CD or a live USB or,
• It can run within a virtual machine.
• KALI LINUX can also be installed within a chroot
environment on an android device.
• Also Available for ARM devices like :
Chromebooks Samsung Galaxy Note 10.1
Raspberry PiCuBox
Nexus & OnePlus
(Kali NetHunter)
Trim Slice
Top-10 Security Tools in
KALI LINUX
Kali Linux is preinstalled with various
penetration Testing programs
• nmap - port scanning,service and OS
fingerprinting
• Wireshark - a packet analyzer.
• John The Ripper - a password cracker.
• Aircrack-ng – a software suite for
penetration testing of wireless LANs.
• Hydra - Brute force password cracking tool.
• Maltego - Information on visualization &
relationship analysis tool.
• Metasloit - Framework for developing and
executing exploits.
• OWASP-ZAP – Integrated pentesting tool for
web application.
• Sqlmap – Finds SQL injection flaws for taking
over of database servers.
Any Queries ?
Thank You

More Related Content

What's hot

penetration test using Kali linux ppt
penetration test using Kali linux pptpenetration test using Kali linux ppt
penetration test using Kali linux ppt
AbhayNaik8
 
kali linux
kali linuxkali linux
kali linux
Darshan Dalwadi
 
Kali linux
Kali linuxKali linux
Kali linux
AadhithyanPandian
 
Tools kali
Tools kaliTools kali
Tools kali
ketban0702
 
Kali linux os
Kali linux osKali linux os
Kali linux os
Samantha Lawrence
 
Kali linux
Kali linux Kali linux
Kali linux
Fa6ma_
 
Linux
LinuxLinux
Linux
shamxsa
 
Kali linux summarised
Kali linux summarisedKali linux summarised
Kali linux summarised
Sanchit Srivastava
 
Linux Presentation
Linux PresentationLinux Presentation
Linux Presentation
Naiyan Noor
 
Kali Linux-Operating System Presentation.pptx
Kali Linux-Operating System Presentation.pptxKali Linux-Operating System Presentation.pptx
Kali Linux-Operating System Presentation.pptx
SumaiyaSinja1
 
History of linux
History of linuxHistory of linux
History of linux
Shiwang Kalkhanda
 
SAST vs. DAST: What’s the Best Method For Application Security Testing?
SAST vs. DAST: What’s the Best Method For Application Security Testing?SAST vs. DAST: What’s the Best Method For Application Security Testing?
SAST vs. DAST: What’s the Best Method For Application Security Testing?
Cigital
 
Pentest with Metasploit
Pentest with MetasploitPentest with Metasploit
Pentest with Metasploit
M.Syarifudin, ST, OSCP, OSWP
 
Supply Chain Attacks
Supply Chain AttacksSupply Chain Attacks
Supply Chain Attacks
Lionel Faleiro
 
Software Composition Analysis Deep Dive
Software Composition Analysis Deep DiveSoftware Composition Analysis Deep Dive
Software Composition Analysis Deep Dive
Ulisses Albuquerque
 
Linux Presentation
Linux PresentationLinux Presentation
Linux Presentation
aliabintouq
 
Metasploit framwork
Metasploit framworkMetasploit framwork
Metasploit framwork
Deepanshu Gajbhiye
 
Metasploit
MetasploitMetasploit
Metasploit
henelpj
 
Metasploit
MetasploitMetasploit
Metasploit
Lalith Sai
 

What's hot (20)

penetration test using Kali linux ppt
penetration test using Kali linux pptpenetration test using Kali linux ppt
penetration test using Kali linux ppt
 
kali linux
kali linuxkali linux
kali linux
 
Kali linux
Kali linuxKali linux
Kali linux
 
Tools kali
Tools kaliTools kali
Tools kali
 
Kali linux os
Kali linux osKali linux os
Kali linux os
 
Kali linux
Kali linux Kali linux
Kali linux
 
Linux
LinuxLinux
Linux
 
Kali linux summarised
Kali linux summarisedKali linux summarised
Kali linux summarised
 
Linux basics
Linux basicsLinux basics
Linux basics
 
Linux Presentation
Linux PresentationLinux Presentation
Linux Presentation
 
Kali Linux-Operating System Presentation.pptx
Kali Linux-Operating System Presentation.pptxKali Linux-Operating System Presentation.pptx
Kali Linux-Operating System Presentation.pptx
 
History of linux
History of linuxHistory of linux
History of linux
 
SAST vs. DAST: What’s the Best Method For Application Security Testing?
SAST vs. DAST: What’s the Best Method For Application Security Testing?SAST vs. DAST: What’s the Best Method For Application Security Testing?
SAST vs. DAST: What’s the Best Method For Application Security Testing?
 
Pentest with Metasploit
Pentest with MetasploitPentest with Metasploit
Pentest with Metasploit
 
Supply Chain Attacks
Supply Chain AttacksSupply Chain Attacks
Supply Chain Attacks
 
Software Composition Analysis Deep Dive
Software Composition Analysis Deep DiveSoftware Composition Analysis Deep Dive
Software Composition Analysis Deep Dive
 
Linux Presentation
Linux PresentationLinux Presentation
Linux Presentation
 
Metasploit framwork
Metasploit framworkMetasploit framwork
Metasploit framwork
 
Metasploit
MetasploitMetasploit
Metasploit
 
Metasploit
MetasploitMetasploit
Metasploit
 

Viewers also liked

Kali Linux - CleveSec 2015
Kali Linux - CleveSec 2015Kali Linux - CleveSec 2015
Kali Linux - CleveSec 2015TGodfrey
 
Kali Linux - Falconer
Kali Linux - FalconerKali Linux - Falconer
Kali Linux - Falconer
Tony Godfrey
 
Wireshark Basics
Wireshark BasicsWireshark Basics
Wireshark Basics
Yoram Orzach
 
The Challenge of Locating ‘Culture’ in Location-Based Games
The Challenge of Locating ‘Culture’ in Location-Based GamesThe Challenge of Locating ‘Culture’ in Location-Based Games
The Challenge of Locating ‘Culture’ in Location-Based Games
Kyle Moore
 
BASIC OVERVIEW OF KALI LINUX
BASIC OVERVIEW OF KALI LINUXBASIC OVERVIEW OF KALI LINUX
BASIC OVERVIEW OF KALI LINUX
Deborah Akuoko
 
(03 2013) guide to kali linux
(03 2013)   guide to kali linux(03 2013)   guide to kali linux
(03 2013) guide to kali linux
julius77
 
Kali Linux
Kali LinuxKali Linux
Kali Linux
Sumit Singh
 
Kali linux
Kali linuxKali linux
Kali linux
MaryamAlR
 
The Little Black Book of Scams
The Little Black Book of ScamsThe Little Black Book of Scams
The Little Black Book of Scams
- Mark - Fullbright
 
Kali tools list with short description
Kali tools list with short descriptionKali tools list with short description
Kali tools list with short description
Jose Moruno Cadima
 
The Magic of Thinking Big
The Magic of Thinking BigThe Magic of Thinking Big
The Magic of Thinking Big
Marta Sánchez Pol (马佳)
 
Wireshark Inroduction Li In
Wireshark Inroduction  Li InWireshark Inroduction  Li In
Wireshark Inroduction Li In
mhaviv
 
Hack wifi password using kali linux
Hack wifi password using kali linuxHack wifi password using kali linux
Hack wifi password using kali linux
Helder Oliveira
 
Super computers by rachna
Super computers by  rachnaSuper computers by  rachna
Super computers by rachnaRachna Singh
 
supercomputer
supercomputersupercomputer
supercomputer
panjab university
 

Viewers also liked (19)

Kali Linux - CleveSec 2015
Kali Linux - CleveSec 2015Kali Linux - CleveSec 2015
Kali Linux - CleveSec 2015
 
Kali Linux - Falconer
Kali Linux - FalconerKali Linux - Falconer
Kali Linux - Falconer
 
Wireshark Basics
Wireshark BasicsWireshark Basics
Wireshark Basics
 
The Challenge of Locating ‘Culture’ in Location-Based Games
The Challenge of Locating ‘Culture’ in Location-Based GamesThe Challenge of Locating ‘Culture’ in Location-Based Games
The Challenge of Locating ‘Culture’ in Location-Based Games
 
BASIC OVERVIEW OF KALI LINUX
BASIC OVERVIEW OF KALI LINUXBASIC OVERVIEW OF KALI LINUX
BASIC OVERVIEW OF KALI LINUX
 
(03 2013) guide to kali linux
(03 2013)   guide to kali linux(03 2013)   guide to kali linux
(03 2013) guide to kali linux
 
Kali Linux
Kali LinuxKali Linux
Kali Linux
 
Kali linux
Kali linuxKali linux
Kali linux
 
The Little Black Book of Scams
The Little Black Book of ScamsThe Little Black Book of Scams
The Little Black Book of Scams
 
Kali tools list with short description
Kali tools list with short descriptionKali tools list with short description
Kali tools list with short description
 
The Magic of Thinking Big
The Magic of Thinking BigThe Magic of Thinking Big
The Magic of Thinking Big
 
Wireshark Inroduction Li In
Wireshark Inroduction  Li InWireshark Inroduction  Li In
Wireshark Inroduction Li In
 
Supercomputers
SupercomputersSupercomputers
Supercomputers
 
Hack wifi password using kali linux
Hack wifi password using kali linuxHack wifi password using kali linux
Hack wifi password using kali linux
 
Super computers by rachna
Super computers by  rachnaSuper computers by  rachna
Super computers by rachna
 
supercomputer
supercomputersupercomputer
supercomputer
 
Nmap Basics
Nmap BasicsNmap Basics
Nmap Basics
 
Super computer
Super computerSuper computer
Super computer
 
Flying Cars
Flying CarsFlying Cars
Flying Cars
 

Similar to Kali linux

Unleash the Power: How to Install Kali Linux With a Twist
Unleash the Power: How to Install Kali Linux With a TwistUnleash the Power: How to Install Kali Linux With a Twist
Unleash the Power: How to Install Kali Linux With a Twist
FredReynolds2
 
linux.pptx
linux.pptxlinux.pptx
linux.pptx
AudieMarAgpawa
 
Shamsa altayer 10bg kali linux
Shamsa altayer 10bg   kali linuxShamsa altayer 10bg   kali linux
Shamsa altayer 10bg kali linux
shamsaot
 
Kali linux
Kali linuxKali linux
Kali linux
afraalfalasii
 
Kalilinux
KalilinuxKalilinux
Kalilinux
haha loser
 
Operating system
Operating systemOperating system
Operating system
KartikeyBanjara1
 
Kali linux
Kali linuxKali linux
Kali linux
futaimbinlahej
 
Kali presentation
Kali presentationKali presentation
Kali presentation
Zain Ul abadin
 
kali linix
kali linixkali linix
kali linix
Mirza Baig
 
Kal i linux
Kal i linuxKal i linux
Kal i linux
shamsa222
 
Kali Linux - Falconer - ISS 2014
Kali Linux - Falconer - ISS 2014Kali Linux - Falconer - ISS 2014
Kali Linux - Falconer - ISS 2014
TGodfrey
 
Kali Linux
Kali Linux Kali Linux
Kali Linux
aliabintouq
 
Kalilinux
KalilinuxKalilinux
Kalilinux
almuhairi2000
 
Kali linux and some features [view in Full screen mode]
Kali linux and some features [view in Full screen mode]Kali linux and some features [view in Full screen mode]
Kali linux and some features [view in Full screen mode]
abdou Bahassou
 
Operating project
Operating projectOperating project
Operating project
ISMAT CH
 
technical-presentation-kali-linux.pptx
technical-presentation-kali-linux.pptxtechnical-presentation-kali-linux.pptx
technical-presentation-kali-linux.pptx
jayanthansabalingam
 
Intro to Kali Linux -.pptx
Intro to Kali Linux -.pptxIntro to Kali Linux -.pptx
Intro to Kali Linux -.pptx
KojaSb
 
technical-presentation-kali-linux.pptx hakkında
technical-presentation-kali-linux.pptx hakkındatechnical-presentation-kali-linux.pptx hakkında
technical-presentation-kali-linux.pptx hakkında
NuhAzgnolu1
 
kali linux.pptx
kali linux.pptxkali linux.pptx
kali linux.pptx
itdepartmentkct
 
kali linux.pptx
kali linux.pptxkali linux.pptx
kali linux.pptx
AdityaKumar1548
 

Similar to Kali linux (20)

Unleash the Power: How to Install Kali Linux With a Twist
Unleash the Power: How to Install Kali Linux With a TwistUnleash the Power: How to Install Kali Linux With a Twist
Unleash the Power: How to Install Kali Linux With a Twist
 
linux.pptx
linux.pptxlinux.pptx
linux.pptx
 
Shamsa altayer 10bg kali linux
Shamsa altayer 10bg   kali linuxShamsa altayer 10bg   kali linux
Shamsa altayer 10bg kali linux
 
Kali linux
Kali linuxKali linux
Kali linux
 
Kalilinux
KalilinuxKalilinux
Kalilinux
 
Operating system
Operating systemOperating system
Operating system
 
Kali linux
Kali linuxKali linux
Kali linux
 
Kali presentation
Kali presentationKali presentation
Kali presentation
 
kali linix
kali linixkali linix
kali linix
 
Kal i linux
Kal i linuxKal i linux
Kal i linux
 
Kali Linux - Falconer - ISS 2014
Kali Linux - Falconer - ISS 2014Kali Linux - Falconer - ISS 2014
Kali Linux - Falconer - ISS 2014
 
Kali Linux
Kali Linux Kali Linux
Kali Linux
 
Kalilinux
KalilinuxKalilinux
Kalilinux
 
Kali linux and some features [view in Full screen mode]
Kali linux and some features [view in Full screen mode]Kali linux and some features [view in Full screen mode]
Kali linux and some features [view in Full screen mode]
 
Operating project
Operating projectOperating project
Operating project
 
technical-presentation-kali-linux.pptx
technical-presentation-kali-linux.pptxtechnical-presentation-kali-linux.pptx
technical-presentation-kali-linux.pptx
 
Intro to Kali Linux -.pptx
Intro to Kali Linux -.pptxIntro to Kali Linux -.pptx
Intro to Kali Linux -.pptx
 
technical-presentation-kali-linux.pptx hakkında
technical-presentation-kali-linux.pptx hakkındatechnical-presentation-kali-linux.pptx hakkında
technical-presentation-kali-linux.pptx hakkında
 
kali linux.pptx
kali linux.pptxkali linux.pptx
kali linux.pptx
 
kali linux.pptx
kali linux.pptxkali linux.pptx
kali linux.pptx
 

Recently uploaded

Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 

Recently uploaded (20)

Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 

Kali linux

  • 1.
  • 3. The Birth of KALI LINUX • Kali Linux is a Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. Kali contains several hundred tools aimed at various Information Security tasks, such as Penetration Testing, Forensics and Reverse Engineering. • Kali Linux is Developed, Funded and Maintained by Offensive Security, a leading information security training company. • Kali Linux was released on the 13th March, 2013 as a complete rebuild of BackTrack Linux.
  • 4. What is KALI LINUX? • Kali Linux is an Advanced Penetration Testing and Security Auditing Linux distribution. • Kali Linux is Named after a Hindu goddess. • Developed by Mati Aharoni (muts), Devon Kearns (dookie) and, Raphaël Hertzog (bux) of Offensive Security.
  • 5. Kali Linux Core Developers Mati Aharoni (muts) is the lead Kali developer, trainer and founder of Offensive Security. With over 10 years of experience as a professional penetration tester, Mati has uncovered several major security flaws and is actively involved in the offensive security arena. Mati Aharoni :
  • 6. Devon Kearns (dookie) is an Offensive Security instructor, Kali Linux developer, the administrator of the Exploit Database, co-creator of the Metasploit Unleashed project, fanatic, and co-author of Metasploit: The Penetration Tester’s Guide. Devon Kearns :
  • 7. Raphaël Hertzog (bux) is an experienced Debian developer and consultant, author of the well known Debian Administrator’s Handbook. He’s the packaging wizard in team and manages continuously growing development infrastructure. Raphaël Hertzog :
  • 8. More About KALI LINUX… • Open Source • Developed in a secure environment. • Available in 32-bit and 64-bit images. • It’s first version of Kali 1.0.0 was Released on 13th March, 2013. • It’s newest version Kali 2.0 was released on 11th August, 2015. • Free and always will be.
  • 9. Features of KALI LINUX • Completely customizable. • 600+ Applications, from Password crackers to Digital Forensics software. • Multi Language Support. • Vast Wireless device support and Compatible with USB. • Switched from Ubuntu to Debian. • Easy upgrade to future versions.
  • 10. What is Penetration Testing? “The process of evaluating Systems, Applications, and Protocols with the intent of identifying loopholes usually from the viewpoint of an anonymous user to determine potential real world impacts…” Or in other words …we try to break into stuff before the bad guys do…
  • 11. Flexibility of KALI LINUX • Kali Linux can run natively when installed on a computer’s hard disk or, • It can be booted from a live CD or a live USB or, • It can run within a virtual machine. • KALI LINUX can also be installed within a chroot environment on an android device.
  • 12. • Also Available for ARM devices like : Chromebooks Samsung Galaxy Note 10.1
  • 14. Nexus & OnePlus (Kali NetHunter) Trim Slice
  • 15. Top-10 Security Tools in KALI LINUX Kali Linux is preinstalled with various penetration Testing programs • nmap - port scanning,service and OS fingerprinting • Wireshark - a packet analyzer. • John The Ripper - a password cracker. • Aircrack-ng – a software suite for penetration testing of wireless LANs.
  • 16. • Hydra - Brute force password cracking tool. • Maltego - Information on visualization & relationship analysis tool. • Metasloit - Framework for developing and executing exploits. • OWASP-ZAP – Integrated pentesting tool for web application. • Sqlmap – Finds SQL injection flaws for taking over of database servers.