SlideShare a Scribd company logo
1 of 19
INTRODUCTION
•Rewrite of Backtrack.
• What is open source?
• What is Linux?
• What is Kali Linux?
• History
• Penetration testing and Digital forensics
• Features and Flexibility
• Why use Kali?
• Misconceptions
OPEN SOURCE
• What is open source?
• Open Source is something which you can
modify as per your needs, share with others
without any licensing violation burden.
• Examples: Linux , OpenIndiana, React OS etc.
What is LINUX?
• Linux is a kernel. People have a misconception
that it is an operating system but it actually is a
part of the OS and not a complete OS (you can
search for the difference over the Internet).
• The Linux kernel was developed by Linus
Torvalds .
• It is an Open Source software which means that
the code is freely available and anyone can make
changes to it as per their choice.
What is Kali Linux ?
• Kali Linux is a Debian-derived Linux distribution
And a member of UNIX OS Family.
• Maintained and Funded by Offensive Security
Limited.
• Primarily designed for Penetration Testing and
Digital Forensics.
• Developed by Mati Aharoni and Devon Kearns
of Offensive Security.
• Rewrite of Backtrack.
Kali Linux Core Developers
Mati Aharoni (muts) is the
lead Kali developer, trainer
and founder of Offensive
Security. With over 10 years
of experience as a
professional penetration
tester, Mati has uncovered
several major security flaws
and is actively involved in the
offensive security arena.
Mati Aharoni :
Devon Kearns (dookie) is an
Offensive Security instructor,
Kali Linux developer, the
administrator of the Exploit
Database, co-creator of the
Metasploit Unleashed project,
fanatic, and co-author of
Metasploit: The Penetration
Tester’s Guide.
Devon Kearns :
Raphaël Hertzog (bux) is an
experienced Debian
developer and consultant,
author of the well known
Debian Administrator’s
Handbook. He’s the packaging
wizard in team and manages
continuously growing
development infrastructure.
Raphaël Hertzog :
History
• Knoppix , ancestor of Kali Linux was the first ever
bootable Live Linux Operating system , which is still in
existence.
• Knoppix project was then forked into Whoppix and then
re-forked into WHAX.
• WHAX was then re-branded and streamlined into the
BackTrack , the predecessor of Kali Linux.
• BackTrack had a long reign of almost seven years as
the pentesters and hackers choice.
• BackTrack is a customised native environment dedicated
to hacking. As of 2011 it was used by more than four
million amateur and professional security researchers.
What is Penetration Testing?
“The process of evaluating systems ,
applications , and protocols with the intent of
identifying vulnerabilities usually from the
perspective of an unprivileged or anonymous
user to determine potential real world
impacts…”
Or in other words
…we try to break into stuff before the bad guys
do…
Kali Linux Penetration-Testing
Programs
• nmap - a port scanner.
• Wireshark - a packet analyzer.
• John The Ripper - a password cracker.
• Aircrack-ng – a software suite for penetration
testing wireless LANs.
• iKat- a hacking tool
Kali Linux is preinstalled with numerous penetration
Testing programs:-
What is Digital Forensics?
• Digital forensics (sometimes known as digital
forensic science) is a branch of forensic
science encompassing the recovery and
investigation of material found in digital
devices, often in relation to computer crime
Features of KALI LINUX
• Has more than 300 penetration testing tools.
• Multilingual Support
• Completely Customizable.
• Free and Always will be.
• Vast Wireless device support and Compatible
with USB.
• GPG signed packages and repos.
• ARM support(ARMEL & ARMHF)-Kali Linux has
ARM repositories integrated with mainline
distribution.
Flexibility of KALI LINUX
• Kali Linux can run natively when installed on
a computer’s hard disk or,
• Can be booted from a live CD or a live USB or,
• It can run within a virtual machine.
• Available for ARM devices like Samsung
Chromebook, Samsung Galaxy Note 10.1,
Raspberry Pi , CuBox , and a lot more.
• KALI LINUX can also be installed within a
chroot environment on an android device.
• It is FREE!!!!!
• 300+ applications, from password crackers to digital
forensics software.
• Vast wireless device support (ARM processors).
• Completely Customizable.
• Multilingual Support.
• Secure Development Environment.
• Open source Git tree.
• Filesystem Hierarchy Standard (FHS) Compliant.
• Gnu Privacy Guard (GPG) secure signed packages and
repos.
Why use Kali?
Misconceptions about Kali!
• It's a misconception that Kali Linux
means HACKING.
• Kali Linux is yet another Linux distribution based
on Debian philosophy and wide range of useful
tools that are required for fair penetration test,
vulnerability analysis and network tool.
• Kali Linux is NOT for hacking or cracking or
stealing someone's data or getting someone's
Facebook or Gmail password. It's purely a myth.
Any Queries ?
Presented By :
Mr. Sumit Kumar
Mr. Shubham Kumar
At “Swami Keshvanand Institute Of Technology
Management & Gramothan, Jaipur”

More Related Content

What's hot

Kali Linux - Falconer
Kali Linux - FalconerKali Linux - Falconer
Kali Linux - FalconerTony Godfrey
 
penetration test using Kali linux ppt
penetration test using Kali linux pptpenetration test using Kali linux ppt
penetration test using Kali linux pptAbhayNaik8
 
Kali linux and some features [view in Full screen mode]
Kali linux and some features [view in Full screen mode]Kali linux and some features [view in Full screen mode]
Kali linux and some features [view in Full screen mode]abdou Bahassou
 
Kali Linux - Falconer - ISS 2014
Kali Linux - Falconer - ISS 2014Kali Linux - Falconer - ISS 2014
Kali Linux - Falconer - ISS 2014TGodfrey
 
(03 2013) guide to kali linux
(03 2013)   guide to kali linux(03 2013)   guide to kali linux
(03 2013) guide to kali linuxjulius77
 
penetration test using Kali linux seminar report
penetration test using Kali linux seminar reportpenetration test using Kali linux seminar report
penetration test using Kali linux seminar reportAbhayNaik8
 
Shamsa altayer 10bg kali linux
Shamsa altayer 10bg   kali linuxShamsa altayer 10bg   kali linux
Shamsa altayer 10bg kali linuxshamsaot
 
Kali linux
Kali linux Kali linux
Kali linux Fa6ma_
 
BASIC OVERVIEW OF KALI LINUX
BASIC OVERVIEW OF KALI LINUXBASIC OVERVIEW OF KALI LINUX
BASIC OVERVIEW OF KALI LINUXDeborah Akuoko
 

What's hot (20)

Kali linux
Kali linuxKali linux
Kali linux
 
Kali linux
Kali linuxKali linux
Kali linux
 
Kali linux
Kali linuxKali linux
Kali linux
 
Kali Linux - Falconer
Kali Linux - FalconerKali Linux - Falconer
Kali Linux - Falconer
 
kali linux
kali linuxkali linux
kali linux
 
Kali Linux
Kali LinuxKali Linux
Kali Linux
 
Kali linux
Kali linuxKali linux
Kali linux
 
penetration test using Kali linux ppt
penetration test using Kali linux pptpenetration test using Kali linux ppt
penetration test using Kali linux ppt
 
Kali linux and some features [view in Full screen mode]
Kali linux and some features [view in Full screen mode]Kali linux and some features [view in Full screen mode]
Kali linux and some features [view in Full screen mode]
 
Kali presentation
Kali presentationKali presentation
Kali presentation
 
Tools kali
Tools kaliTools kali
Tools kali
 
Kali Linux - Falconer - ISS 2014
Kali Linux - Falconer - ISS 2014Kali Linux - Falconer - ISS 2014
Kali Linux - Falconer - ISS 2014
 
(03 2013) guide to kali linux
(03 2013)   guide to kali linux(03 2013)   guide to kali linux
(03 2013) guide to kali linux
 
penetration test using Kali linux seminar report
penetration test using Kali linux seminar reportpenetration test using Kali linux seminar report
penetration test using Kali linux seminar report
 
Shamsa altayer 10bg kali linux
Shamsa altayer 10bg   kali linuxShamsa altayer 10bg   kali linux
Shamsa altayer 10bg kali linux
 
Kali linux
Kali linuxKali linux
Kali linux
 
Kali linux
Kali linux Kali linux
Kali linux
 
Kalilinux
KalilinuxKalilinux
Kalilinux
 
Kali linux os
Kali linux osKali linux os
Kali linux os
 
BASIC OVERVIEW OF KALI LINUX
BASIC OVERVIEW OF KALI LINUXBASIC OVERVIEW OF KALI LINUX
BASIC OVERVIEW OF KALI LINUX
 

Viewers also liked

Drupal Coder Zafiyet Analizi & İstismar Kodu Geliştirimesi
Drupal Coder Zafiyet Analizi & İstismar Kodu GeliştirimesiDrupal Coder Zafiyet Analizi & İstismar Kodu Geliştirimesi
Drupal Coder Zafiyet Analizi & İstismar Kodu GeliştirimesiMehmet Ince
 
Web Uygulamalarında Kayank Kod Analizi – II
Web Uygulamalarında Kayank Kod Analizi – IIWeb Uygulamalarında Kayank Kod Analizi – II
Web Uygulamalarında Kayank Kod Analizi – IIMehmet Ince
 
Web Uygulama Güvenliği 101
Web Uygulama Güvenliği 101Web Uygulama Güvenliği 101
Web Uygulama Güvenliği 101Mehmet Ince
 
Web Uygulamalarında Kaynak Kod Analizi - 1
Web Uygulamalarında Kaynak Kod Analizi - 1Web Uygulamalarında Kaynak Kod Analizi - 1
Web Uygulamalarında Kaynak Kod Analizi - 1Mehmet Ince
 
Wireshark Inroduction Li In
Wireshark Inroduction  Li InWireshark Inroduction  Li In
Wireshark Inroduction Li Inmhaviv
 
Beyaz Şapkalı Hacker (CEH) Lab Kitabı
Beyaz Şapkalı Hacker (CEH) Lab KitabıBeyaz Şapkalı Hacker (CEH) Lab Kitabı
Beyaz Şapkalı Hacker (CEH) Lab KitabıBGA Cyber Security
 
Kali ile Linux'e Giriş | IntelRAD
Kali ile Linux'e Giriş | IntelRADKali ile Linux'e Giriş | IntelRAD
Kali ile Linux'e Giriş | IntelRADMehmet Ince
 
password cracking using John the ripper, hashcat, Cain&abel
password cracking using John the ripper, hashcat, Cain&abelpassword cracking using John the ripper, hashcat, Cain&abel
password cracking using John the ripper, hashcat, Cain&abelShweta Sharma
 

Viewers also liked (11)

Drupal Coder Zafiyet Analizi & İstismar Kodu Geliştirimesi
Drupal Coder Zafiyet Analizi & İstismar Kodu GeliştirimesiDrupal Coder Zafiyet Analizi & İstismar Kodu Geliştirimesi
Drupal Coder Zafiyet Analizi & İstismar Kodu Geliştirimesi
 
Web Uygulamalarında Kayank Kod Analizi – II
Web Uygulamalarında Kayank Kod Analizi – IIWeb Uygulamalarında Kayank Kod Analizi – II
Web Uygulamalarında Kayank Kod Analizi – II
 
Web Uygulama Güvenliği 101
Web Uygulama Güvenliği 101Web Uygulama Güvenliği 101
Web Uygulama Güvenliği 101
 
Web Uygulamalarında Kaynak Kod Analizi - 1
Web Uygulamalarında Kaynak Kod Analizi - 1Web Uygulamalarında Kaynak Kod Analizi - 1
Web Uygulamalarında Kaynak Kod Analizi - 1
 
Wireshark Inroduction Li In
Wireshark Inroduction  Li InWireshark Inroduction  Li In
Wireshark Inroduction Li In
 
Nmap Basics
Nmap BasicsNmap Basics
Nmap Basics
 
Wireshark Basics
Wireshark BasicsWireshark Basics
Wireshark Basics
 
Kali linux
Kali linuxKali linux
Kali linux
 
Beyaz Şapkalı Hacker (CEH) Lab Kitabı
Beyaz Şapkalı Hacker (CEH) Lab KitabıBeyaz Şapkalı Hacker (CEH) Lab Kitabı
Beyaz Şapkalı Hacker (CEH) Lab Kitabı
 
Kali ile Linux'e Giriş | IntelRAD
Kali ile Linux'e Giriş | IntelRADKali ile Linux'e Giriş | IntelRAD
Kali ile Linux'e Giriş | IntelRAD
 
password cracking using John the ripper, hashcat, Cain&abel
password cracking using John the ripper, hashcat, Cain&abelpassword cracking using John the ripper, hashcat, Cain&abel
password cracking using John the ripper, hashcat, Cain&abel
 

Similar to Kali Linux

Similar to Kali Linux (20)

Kalilinux
KalilinuxKalilinux
Kalilinux
 
Operating system
Operating systemOperating system
Operating system
 
kali linix
kali linixkali linix
kali linix
 
Linux Training Center Pune
Linux Training Center PuneLinux Training Center Pune
Linux Training Center Pune
 
linux.pptx
linux.pptxlinux.pptx
linux.pptx
 
01 linux history overview
01 linux history overview01 linux history overview
01 linux history overview
 
College copy
College copyCollege copy
College copy
 
Linux basics
Linux basicsLinux basics
Linux basics
 
Operating project
Operating projectOperating project
Operating project
 
Overview on Open Source Technology.pptx
Overview on Open Source Technology.pptxOverview on Open Source Technology.pptx
Overview on Open Source Technology.pptx
 
Linux a free and open source operating system
Linux a free and open source operating systemLinux a free and open source operating system
Linux a free and open source operating system
 
Linux a free and open source operating system
Linux a free and open source operating systemLinux a free and open source operating system
Linux a free and open source operating system
 
Linux training in chandigarh
Linux training in chandigarhLinux training in chandigarh
Linux training in chandigarh
 
Kali linux.ppt
Kali linux.pptKali linux.ppt
Kali linux.ppt
 
Open Source Software
Open Source Software Open Source Software
Open Source Software
 
Linux Operating System
Linux Operating SystemLinux Operating System
Linux Operating System
 
Linux
LinuxLinux
Linux
 
Linux Operating System.pdf
Linux Operating System.pdfLinux Operating System.pdf
Linux Operating System.pdf
 
Introduction to Linux basic
Introduction to Linux basicIntroduction to Linux basic
Introduction to Linux basic
 
Linux
LinuxLinux
Linux
 

Recently uploaded

OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 

Recently uploaded (20)

OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 

Kali Linux

  • 2. • What is open source? • What is Linux? • What is Kali Linux? • History • Penetration testing and Digital forensics • Features and Flexibility • Why use Kali? • Misconceptions
  • 3. OPEN SOURCE • What is open source? • Open Source is something which you can modify as per your needs, share with others without any licensing violation burden. • Examples: Linux , OpenIndiana, React OS etc.
  • 4. What is LINUX? • Linux is a kernel. People have a misconception that it is an operating system but it actually is a part of the OS and not a complete OS (you can search for the difference over the Internet). • The Linux kernel was developed by Linus Torvalds . • It is an Open Source software which means that the code is freely available and anyone can make changes to it as per their choice.
  • 5. What is Kali Linux ? • Kali Linux is a Debian-derived Linux distribution And a member of UNIX OS Family. • Maintained and Funded by Offensive Security Limited. • Primarily designed for Penetration Testing and Digital Forensics. • Developed by Mati Aharoni and Devon Kearns of Offensive Security. • Rewrite of Backtrack.
  • 6. Kali Linux Core Developers Mati Aharoni (muts) is the lead Kali developer, trainer and founder of Offensive Security. With over 10 years of experience as a professional penetration tester, Mati has uncovered several major security flaws and is actively involved in the offensive security arena. Mati Aharoni :
  • 7. Devon Kearns (dookie) is an Offensive Security instructor, Kali Linux developer, the administrator of the Exploit Database, co-creator of the Metasploit Unleashed project, fanatic, and co-author of Metasploit: The Penetration Tester’s Guide. Devon Kearns :
  • 8. Raphaël Hertzog (bux) is an experienced Debian developer and consultant, author of the well known Debian Administrator’s Handbook. He’s the packaging wizard in team and manages continuously growing development infrastructure. Raphaël Hertzog :
  • 9. History • Knoppix , ancestor of Kali Linux was the first ever bootable Live Linux Operating system , which is still in existence. • Knoppix project was then forked into Whoppix and then re-forked into WHAX. • WHAX was then re-branded and streamlined into the BackTrack , the predecessor of Kali Linux. • BackTrack had a long reign of almost seven years as the pentesters and hackers choice. • BackTrack is a customised native environment dedicated to hacking. As of 2011 it was used by more than four million amateur and professional security researchers.
  • 10. What is Penetration Testing? “The process of evaluating systems , applications , and protocols with the intent of identifying vulnerabilities usually from the perspective of an unprivileged or anonymous user to determine potential real world impacts…” Or in other words …we try to break into stuff before the bad guys do…
  • 11. Kali Linux Penetration-Testing Programs • nmap - a port scanner. • Wireshark - a packet analyzer. • John The Ripper - a password cracker. • Aircrack-ng – a software suite for penetration testing wireless LANs. • iKat- a hacking tool Kali Linux is preinstalled with numerous penetration Testing programs:-
  • 12. What is Digital Forensics? • Digital forensics (sometimes known as digital forensic science) is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime
  • 13. Features of KALI LINUX • Has more than 300 penetration testing tools. • Multilingual Support • Completely Customizable. • Free and Always will be. • Vast Wireless device support and Compatible with USB. • GPG signed packages and repos. • ARM support(ARMEL & ARMHF)-Kali Linux has ARM repositories integrated with mainline distribution.
  • 14. Flexibility of KALI LINUX • Kali Linux can run natively when installed on a computer’s hard disk or, • Can be booted from a live CD or a live USB or, • It can run within a virtual machine. • Available for ARM devices like Samsung Chromebook, Samsung Galaxy Note 10.1, Raspberry Pi , CuBox , and a lot more. • KALI LINUX can also be installed within a chroot environment on an android device.
  • 15. • It is FREE!!!!! • 300+ applications, from password crackers to digital forensics software. • Vast wireless device support (ARM processors). • Completely Customizable. • Multilingual Support. • Secure Development Environment. • Open source Git tree. • Filesystem Hierarchy Standard (FHS) Compliant. • Gnu Privacy Guard (GPG) secure signed packages and repos. Why use Kali?
  • 16. Misconceptions about Kali! • It's a misconception that Kali Linux means HACKING. • Kali Linux is yet another Linux distribution based on Debian philosophy and wide range of useful tools that are required for fair penetration test, vulnerability analysis and network tool. • Kali Linux is NOT for hacking or cracking or stealing someone's data or getting someone's Facebook or Gmail password. It's purely a myth.
  • 17.
  • 19. Presented By : Mr. Sumit Kumar Mr. Shubham Kumar At “Swami Keshvanand Institute Of Technology Management & Gramothan, Jaipur”