SlideShare a Scribd company logo
Kali Linux !
echo “Hack, before it’s too late...”
Outline:
Introduction.
An Overview of Kali Linux.
Kali vs Windows.
Kali tools.(Types)
Attacks.
WIFI.
MITM.
Conclusion.
Web applications, networks, software,databases… are
all vulnerable, Ethical hacking is a solution to decrease
the chance of getting hacked !
It’s a proactive way of testing your applications by
simulating an attack that's similar to a real attack that
could occur on any time…
Solution
:
Using Kali Linux as a
powerful penetration
testing Os
Security-focused
Linux distribution
based on Debian.
It’s an upgrade of the
old Backtrack.
It is maintained and
funded by Offensive
Security Ltd.
Kali Linux Features!
- 20GB hard disk space for installation.
- A minimum of 1GB RAM.
- A bootable CD-DVD drive or a USB
stick.
Requirements :
Kali Linux Features!
More than 600 penetration testing tools included
Kali Linux Features!
Kali has more than 435 extra
tools
(apt-get install kali-linux-
all)
Kali Linux Features!
Completely customizable
Kali Linux Features!
Pricin
g
0
Kali Linux Features!
Kali is a flexible Os.
probably it can be
Installed on “anything”…
Kali Vs Windows.
Open Source
Free
Secure
Live CD distribution
Customizable / add features
Closed Source
Pay for it
Windows 10 Pro will
cost $199
Vulnerable
No !
Not Customizable :)
Kali Linux Tools !
System.out.print ("Kali Linux tools") ;
Arp-Scan
Cookie cadger
Copy-router-config
...
BBQSQL
Cisco-Global-exploiter
jSQL
...
Aircrack-ng
Ghost phisher
Reaver
...
System.out.print ("Kali Linux tools") ;
MIMTF
Driftnet
Wireshark
...
Hashcat
Ncrack
John
...
Metasploit
SET
Armitage
...
Attacks
WiFi Attacks
Evil twin attack
1) Scan networks
2) Launch a FakeAP instance to imitate the original access point
3) Deauthenticates all users connected to the target network
4) A fake DNS server is launched
5) Each submitted password is verified by the handshake captured earlier
6) The attack will automatically terminate, as soon as a correct password is submitted
MITM Attack
“Man in the middle” is simply an attack where the hacker secretly
Sniff the data between two parties.
C0nclu$I0n
The open source community is a
large domain where we can explore,
I highly recommend everyone to join
it, code , share , happy hacking ...
</>

More Related Content

What's hot

kali linux Presentaion
 kali linux Presentaion kali linux Presentaion
kali linux Presentaion
Dev Gandhi
 
Kali presentation
Kali presentationKali presentation
Kali presentation
Zain Ul abadin
 
kali linux
kali linux kali linux
kali linux
Avinash Hanwate
 
Kali Linux
Kali LinuxKali Linux
Kali Linux
Sumit Singh
 
Linux/Unix Night - (PEN) Testing Toolkits (English)
Linux/Unix Night - (PEN) Testing Toolkits (English)Linux/Unix Night - (PEN) Testing Toolkits (English)
Linux/Unix Night - (PEN) Testing Toolkits (English)
Jelmer de Reus
 
penetration test using Kali linux seminar report
penetration test using Kali linux seminar reportpenetration test using Kali linux seminar report
penetration test using Kali linux seminar report
AbhayNaik8
 
Kali linux
Kali linux Kali linux
Kali linux
Fa6ma_
 
Kali linux
Kali linuxKali linux
Kali linux
abdulla78
 
Kali Linux - Falconer - ISS 2014
Kali Linux - Falconer - ISS 2014Kali Linux - Falconer - ISS 2014
Kali Linux - Falconer - ISS 2014
TGodfrey
 
Shamsa altayer 10bg kali linux
Shamsa altayer 10bg   kali linuxShamsa altayer 10bg   kali linux
Shamsa altayer 10bg kali linux
shamsaot
 
Kali Linux
Kali LinuxKali Linux
Kali Linux
Shubham Agrawal
 
Kali linux os
Kali linux osKali linux os
Kali linux os
Samantha Lawrence
 
Kalilinux
KalilinuxKalilinux
Kalilinux
almuhairi2000
 
Kali linux tutorial
Kali linux tutorialKali linux tutorial
Kali linux tutorial
HarikaReddy115
 
Kali linux
Kali linuxKali linux
Kali linux
MaryamAlR
 
Hack Attack! An Introduction to Penetration Testing
Hack Attack! An Introduction to Penetration TestingHack Attack! An Introduction to Penetration Testing
Hack Attack! An Introduction to Penetration TestingSteve Phillips
 
Kali Linux - Falconer
Kali Linux - FalconerKali Linux - Falconer
Kali Linux - Falconer
Tony Godfrey
 
Tools kali
Tools kaliTools kali
Tools kali
ketban0702
 

What's hot (19)

kali linux Presentaion
 kali linux Presentaion kali linux Presentaion
kali linux Presentaion
 
Kali presentation
Kali presentationKali presentation
Kali presentation
 
kali linux
kali linux kali linux
kali linux
 
Kali Linux
Kali LinuxKali Linux
Kali Linux
 
Linux/Unix Night - (PEN) Testing Toolkits (English)
Linux/Unix Night - (PEN) Testing Toolkits (English)Linux/Unix Night - (PEN) Testing Toolkits (English)
Linux/Unix Night - (PEN) Testing Toolkits (English)
 
penetration test using Kali linux seminar report
penetration test using Kali linux seminar reportpenetration test using Kali linux seminar report
penetration test using Kali linux seminar report
 
Kali linux
Kali linux Kali linux
Kali linux
 
kali linux.pptx
kali linux.pptxkali linux.pptx
kali linux.pptx
 
Kali linux
Kali linuxKali linux
Kali linux
 
Kali Linux - Falconer - ISS 2014
Kali Linux - Falconer - ISS 2014Kali Linux - Falconer - ISS 2014
Kali Linux - Falconer - ISS 2014
 
Shamsa altayer 10bg kali linux
Shamsa altayer 10bg   kali linuxShamsa altayer 10bg   kali linux
Shamsa altayer 10bg kali linux
 
Kali Linux
Kali LinuxKali Linux
Kali Linux
 
Kali linux os
Kali linux osKali linux os
Kali linux os
 
Kalilinux
KalilinuxKalilinux
Kalilinux
 
Kali linux tutorial
Kali linux tutorialKali linux tutorial
Kali linux tutorial
 
Kali linux
Kali linuxKali linux
Kali linux
 
Hack Attack! An Introduction to Penetration Testing
Hack Attack! An Introduction to Penetration TestingHack Attack! An Introduction to Penetration Testing
Hack Attack! An Introduction to Penetration Testing
 
Kali Linux - Falconer
Kali Linux - FalconerKali Linux - Falconer
Kali Linux - Falconer
 
Tools kali
Tools kaliTools kali
Tools kali
 

Similar to Kali linux and some features [view in Full screen mode]

Kali Linux - CleveSec 2015
Kali Linux - CleveSec 2015Kali Linux - CleveSec 2015
Kali Linux - CleveSec 2015TGodfrey
 
Unleash the Power: How to Install Kali Linux With a Twist
Unleash the Power: How to Install Kali Linux With a TwistUnleash the Power: How to Install Kali Linux With a Twist
Unleash the Power: How to Install Kali Linux With a Twist
FredReynolds2
 
Kali linux.ppt
Kali linux.pptKali linux.ppt
Kali linux.ppt
Ahmedalhassar1
 
How to install Kali Linux? | Edureka
How to install Kali Linux? | EdurekaHow to install Kali Linux? | Edureka
How to install Kali Linux? | Edureka
Edureka!
 
Kalilinux
KalilinuxKalilinux
Kalilinux
haha loser
 
Operating project
Operating projectOperating project
Operating project
ISMAT CH
 
Hackers OS Kali Linux for Penetration Testing - By Cyber Expert Amish Patel -...
Hackers OS Kali Linux for Penetration Testing - By Cyber Expert Amish Patel -...Hackers OS Kali Linux for Penetration Testing - By Cyber Expert Amish Patel -...
Hackers OS Kali Linux for Penetration Testing - By Cyber Expert Amish Patel -...
Amish Patel
 
kali linix
kali linixkali linix
kali linix
Mirza Baig
 
(03 2013) guide to kali linux
(03 2013)   guide to kali linux(03 2013)   guide to kali linux
(03 2013) guide to kali linux
julius77
 
Kali kinux1
Kali kinux1Kali kinux1
Kali kinux1
Mohammad Mafi
 
Kali linux
Kali linuxKali linux
Kali linux
maryamalmarrii
 
Operating system
Operating systemOperating system
Operating system
KartikeyBanjara1
 
Essential Kali Linux Commands for Ethical Hacking.pdf
Essential Kali Linux Commands for Ethical Hacking.pdfEssential Kali Linux Commands for Ethical Hacking.pdf
Essential Kali Linux Commands for Ethical Hacking.pdf
uzair
 
15 hour ali Linux is a unique distribution of Linux in that
15 hour ali Linux is a unique distribution of Linux in that 15 hour ali Linux is a unique distribution of Linux in that
15 hour ali Linux is a unique distribution of Linux in that
kendahudson
 
Kali Linux
Kali Linux Kali Linux
Kali Linux
aliabintouq
 
Kali Linux
Kali LinuxKali Linux
Kali Linux
Sumit Singh
 
linux.pptx
linux.pptxlinux.pptx
linux.pptx
AudieMarAgpawa
 
Kal i linux
Kal i linuxKal i linux
Kal i linux
shamsa222
 
kali linux.pptx
kali linux.pptxkali linux.pptx
kali linux.pptx
itdepartmentkct
 
kali linux.pptx
kali linux.pptxkali linux.pptx
kali linux.pptx
AdityaKumar1548
 

Similar to Kali linux and some features [view in Full screen mode] (20)

Kali Linux - CleveSec 2015
Kali Linux - CleveSec 2015Kali Linux - CleveSec 2015
Kali Linux - CleveSec 2015
 
Unleash the Power: How to Install Kali Linux With a Twist
Unleash the Power: How to Install Kali Linux With a TwistUnleash the Power: How to Install Kali Linux With a Twist
Unleash the Power: How to Install Kali Linux With a Twist
 
Kali linux.ppt
Kali linux.pptKali linux.ppt
Kali linux.ppt
 
How to install Kali Linux? | Edureka
How to install Kali Linux? | EdurekaHow to install Kali Linux? | Edureka
How to install Kali Linux? | Edureka
 
Kalilinux
KalilinuxKalilinux
Kalilinux
 
Operating project
Operating projectOperating project
Operating project
 
Hackers OS Kali Linux for Penetration Testing - By Cyber Expert Amish Patel -...
Hackers OS Kali Linux for Penetration Testing - By Cyber Expert Amish Patel -...Hackers OS Kali Linux for Penetration Testing - By Cyber Expert Amish Patel -...
Hackers OS Kali Linux for Penetration Testing - By Cyber Expert Amish Patel -...
 
kali linix
kali linixkali linix
kali linix
 
(03 2013) guide to kali linux
(03 2013)   guide to kali linux(03 2013)   guide to kali linux
(03 2013) guide to kali linux
 
Kali kinux1
Kali kinux1Kali kinux1
Kali kinux1
 
Kali linux
Kali linuxKali linux
Kali linux
 
Operating system
Operating systemOperating system
Operating system
 
Essential Kali Linux Commands for Ethical Hacking.pdf
Essential Kali Linux Commands for Ethical Hacking.pdfEssential Kali Linux Commands for Ethical Hacking.pdf
Essential Kali Linux Commands for Ethical Hacking.pdf
 
15 hour ali Linux is a unique distribution of Linux in that
15 hour ali Linux is a unique distribution of Linux in that 15 hour ali Linux is a unique distribution of Linux in that
15 hour ali Linux is a unique distribution of Linux in that
 
Kali Linux
Kali Linux Kali Linux
Kali Linux
 
Kali Linux
Kali LinuxKali Linux
Kali Linux
 
linux.pptx
linux.pptxlinux.pptx
linux.pptx
 
Kal i linux
Kal i linuxKal i linux
Kal i linux
 
kali linux.pptx
kali linux.pptxkali linux.pptx
kali linux.pptx
 
kali linux.pptx
kali linux.pptxkali linux.pptx
kali linux.pptx
 

Recently uploaded

Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Sebastiano Panichella
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
Vladimir Samoylov
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
Sebastiano Panichella
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
IP ServerOne
 
María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
eCommerce Institute
 
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Dutch Power
 
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Dutch Power
 
Burning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdfBurning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdf
kkirkland2
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
khadija278284
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
Howard Spence
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Access Innovations, Inc.
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
OECD Directorate for Financial and Enterprise Affairs
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
Faculty of Medicine And Health Sciences
 
Tom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issueTom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issue
amekonnen
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Matjaž Lipuš
 
Gregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptxGregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptx
gharris9
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Sebastiano Panichella
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
faizulhassanfaiz1670
 
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AwangAniqkmals
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
OWASP Beja
 

Recently uploaded (20)

Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
 
María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
 
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
 
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
 
Burning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdfBurning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdf
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
 
Tom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issueTom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issue
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
 
Gregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptxGregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptx
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
 
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
 

Kali linux and some features [view in Full screen mode]