Introduction to
Information and
Communication
Technologies
CS-101
KALI LINUX
Outlines
 Introduction of group members.
 Types of software.
 What is linux.
 What is kali linux.
 Advantages of kali linux.
 Installation of kali linux.
 Attacks of Kali linux.
1. Denial of server Attack.
a) Dos Attack
b) D-Dos Attack
2. Aircrack-ng
3. The FatRat and metasploit Attack.
Introduction to Group Members
 Jawad: 18-CS-10
 Afaq: 18-CS-30
 Saifullah: 18-CS-50
 Daud: 18-CS-40
Presentation #1
Types of Software
There are two types of Software.
System software.
Application software.
Types of Operating Software.
Microsoft Window.
Linux.
Unix.
And many more.
Kali linux Ubuntu
What is Linux?
Operating software that manages computer hardware
 Types of Linux
There are many types of linux , such as
Kali Linux?
Kali linux are used to perform allots of important task such as
Reverse Engineering Security ResearchPenetration Testing
Advantages of Kali Linux
 More than 600 Penetration
 Free and always will be
 Develop by individual
 Multi-language Support
 Completely customizable
 Rooted tool
 Can be Run without installing
 Virus free
How to install Kali Linux
There are several different ways to install kali and run it
on your operating system
• For example
In dual mode On android With usb on HDD
Attacks of Kali
There are more then 600 build-in tools in kali which mean that
we can perform more then 600 attacks with kali . but we will
discus some here with details , which are given below.
Dos Attack Aircrack-ng Fatrat And Metasploit attack
Denial Of Server Attack ( Dos )
 Dos is used for flooding on any deserted server ( Websites )
 The meant of flooding is to send fake request by bot ( fake user ) to
server
 Every servers have certain limits to handle No. of request in a
particular time
 When the flooding increases beyond the limit of the server , then
server become down
 After downing the server by Dos when real user send request to
server to serve that particular web, then server shows an error of 505
to him
 By 505 error server try to said the real user that I am busy right now I
cant serve you
Basic Principal of Dos
Types of Dos
There are two types of Dos attack
 Dos Attack
 D-Dos Attack
How to perform Dos
 There are allots of tools to perform Dos. But we will discus here
about most powerful tool that is “slowsloris”
 Command: python3 slowloris.py example.com
Aircrack-ng
 Aircrack-ng is build-in tool and used to crack air
 With air our mean to crack signals in air. And in our CS these
signals are of Wi-Fi
 With Aircrack-ng we judge a particular wifi. e-g No. of packets
received or send, bassid, station id, etc
 By using bassid and station id attacker send packets toward
selected wifi
 These packets blocks the connection between wifi device and
connected devices. And send his own wifi with name of selected
wifi
 By considering user own wifi, he/she enters password in it and
Aircrack cracks it
Judging the Wi-Fi
 Judging bassid and station id
 Judging Wi-Fi name
 Judging number of packets
 Judging Wi-Fi security
Forcing devices to disconnect
 Aireplay-ng is a by default command and used for sending packets
 Command “-o ” is used for sending number of packets attacker wants to send
 Command “-a ” is used for bassid of selected Wi-Fi
 Command “-c ” is used for station id of selected Wi-Fi
 “ mon0 “ is by default command for Wi-Fi
The FatRat and Metasploit Attack
 To hack any system ( Operating system, Android or Apple ) you
need two things.
1. Virus ( that leeks deserted information from target device )
2. Linker ( that connect virus with attacker device
 For making virus two things are needed.
1. “Ip” address of attacker
2. Value of “lport”
 If attacker can access target device , he will diffidently make virus in
shape of software ( operating sys ) or App ( android, Apple ).
 If attacker cannot access target device ,then he will make virus in
deserted shape of target choice ( pic, document ,link ) and used
communication site.
 Fatrat is used for making virus without typing any commands.
 After reaching virus on target device ,next step of attacker will be to
link his device with virus and Metasploit is used for this.
 Metasploit is used to perform allots of tasks ,but for this particular
task multi/handler is used
 Attacker will connect multi/handler by using “ip” and “lport”
Use of FatRat
 For opening FatRat tool after installing write command “fatrat” on terminal
 For creating virus ( backdoor ) , simply type “1” and press enter
 After opening “msfvenom” for making deserted virus , simply type 1, 2, 3…
Use of Metasploit
Metasploit is a build-in tool, for opening it simply type command “msfconsole”
on terminal.
 It will take several minutes for opening , depending upon your operating
system power.
Opening multi/handler in Metasploit
 For opening multi/handler type command “use exploit/multi/handler”
 Tell him about your virus shape in second command
 Set your lhost ( ip address )
 Set your lport and type “exploit”
 multi/handler will search about your virus , if given values to him will exist
then with in less time he will make connection with virus depending upon
both attacker and target internet speed.
Kali linux  and hacking

Kali linux and hacking

  • 1.
  • 2.
  • 3.
    Outlines  Introduction ofgroup members.  Types of software.  What is linux.  What is kali linux.  Advantages of kali linux.  Installation of kali linux.  Attacks of Kali linux. 1. Denial of server Attack. a) Dos Attack b) D-Dos Attack 2. Aircrack-ng 3. The FatRat and metasploit Attack.
  • 4.
    Introduction to GroupMembers  Jawad: 18-CS-10  Afaq: 18-CS-30  Saifullah: 18-CS-50  Daud: 18-CS-40 Presentation #1
  • 5.
    Types of Software Thereare two types of Software. System software. Application software. Types of Operating Software. Microsoft Window. Linux. Unix. And many more.
  • 6.
    Kali linux Ubuntu Whatis Linux? Operating software that manages computer hardware  Types of Linux There are many types of linux , such as
  • 7.
    Kali Linux? Kali linuxare used to perform allots of important task such as Reverse Engineering Security ResearchPenetration Testing
  • 8.
    Advantages of KaliLinux  More than 600 Penetration  Free and always will be  Develop by individual  Multi-language Support  Completely customizable  Rooted tool  Can be Run without installing  Virus free
  • 9.
    How to installKali Linux There are several different ways to install kali and run it on your operating system • For example In dual mode On android With usb on HDD
  • 10.
    Attacks of Kali Thereare more then 600 build-in tools in kali which mean that we can perform more then 600 attacks with kali . but we will discus some here with details , which are given below. Dos Attack Aircrack-ng Fatrat And Metasploit attack
  • 11.
    Denial Of ServerAttack ( Dos )  Dos is used for flooding on any deserted server ( Websites )  The meant of flooding is to send fake request by bot ( fake user ) to server  Every servers have certain limits to handle No. of request in a particular time  When the flooding increases beyond the limit of the server , then server become down  After downing the server by Dos when real user send request to server to serve that particular web, then server shows an error of 505 to him  By 505 error server try to said the real user that I am busy right now I cant serve you
  • 12.
  • 13.
    Types of Dos Thereare two types of Dos attack  Dos Attack  D-Dos Attack
  • 14.
    How to performDos  There are allots of tools to perform Dos. But we will discus here about most powerful tool that is “slowsloris”  Command: python3 slowloris.py example.com
  • 15.
    Aircrack-ng  Aircrack-ng isbuild-in tool and used to crack air  With air our mean to crack signals in air. And in our CS these signals are of Wi-Fi  With Aircrack-ng we judge a particular wifi. e-g No. of packets received or send, bassid, station id, etc  By using bassid and station id attacker send packets toward selected wifi  These packets blocks the connection between wifi device and connected devices. And send his own wifi with name of selected wifi  By considering user own wifi, he/she enters password in it and Aircrack cracks it
  • 16.
    Judging the Wi-Fi Judging bassid and station id  Judging Wi-Fi name  Judging number of packets  Judging Wi-Fi security
  • 17.
    Forcing devices todisconnect  Aireplay-ng is a by default command and used for sending packets  Command “-o ” is used for sending number of packets attacker wants to send  Command “-a ” is used for bassid of selected Wi-Fi  Command “-c ” is used for station id of selected Wi-Fi  “ mon0 “ is by default command for Wi-Fi
  • 18.
    The FatRat andMetasploit Attack  To hack any system ( Operating system, Android or Apple ) you need two things. 1. Virus ( that leeks deserted information from target device ) 2. Linker ( that connect virus with attacker device  For making virus two things are needed. 1. “Ip” address of attacker 2. Value of “lport”  If attacker can access target device , he will diffidently make virus in shape of software ( operating sys ) or App ( android, Apple ).  If attacker cannot access target device ,then he will make virus in deserted shape of target choice ( pic, document ,link ) and used communication site.  Fatrat is used for making virus without typing any commands.  After reaching virus on target device ,next step of attacker will be to link his device with virus and Metasploit is used for this.  Metasploit is used to perform allots of tasks ,but for this particular task multi/handler is used  Attacker will connect multi/handler by using “ip” and “lport”
  • 19.
    Use of FatRat For opening FatRat tool after installing write command “fatrat” on terminal  For creating virus ( backdoor ) , simply type “1” and press enter  After opening “msfvenom” for making deserted virus , simply type 1, 2, 3…
  • 20.
    Use of Metasploit Metasploitis a build-in tool, for opening it simply type command “msfconsole” on terminal.  It will take several minutes for opening , depending upon your operating system power.
  • 21.
    Opening multi/handler inMetasploit  For opening multi/handler type command “use exploit/multi/handler”  Tell him about your virus shape in second command  Set your lhost ( ip address )  Set your lport and type “exploit”  multi/handler will search about your virus , if given values to him will exist then with in less time he will make connection with virus depending upon both attacker and target internet speed.