SlideShare a Scribd company logo
Kali Linux
KALI LINUX is a Debian-derived Linux distribution designed for digital forensics and
penetration testing.
It is maintained and funded by Offensive Security Ltd. It was developed by MatiAharoni
and Devon Kearns of Offensive Security
 It is the rewrite of BackTrack, their previous forensics Linux distribution.
KALI LINUX:PENETRATION TESTING
OPERATING SYSTEM
What is Penetration Testing?
“The process of evaluating systems ,
applications , and protocols with the intent of
identifying vulnerabilities usually from the
perspective of an unprivileged or anonymous
user to determine potential real world
impacts…”
Or in other words
… trying to break into stuff before the bad guys
do…
Features of KALI LINUX
• Has more than 600 penetration testing tools.
• Multilingual Support
• Completely Customizable.
• Free and Always will be.
• Vast Wireless device support and Compatible
with USB.
• ARM support-Kali Linux has ARM repositories
integrated with mainline distribution.
Flexibility of KALI LINUX
• Kali Linux can run natively when installed on
a computer’s hard disk or,
• Can be booted from a live CD or a live USB or,
• It can run within a virtual machine.
• Available for ARM devices like Samsung
Chromebook, Samsung Galaxy Note 10.1,
Raspberry Pi and a lot more.
• KALI LINUX can also be installed within a root
environment on an android device.
Difference between Kali Linux and
Ubuntu
Ubuntu
• Ubuntu is a general
desktop and server
distribution.
• Designed to satisfy general
Desktop and Server
requirements and also
targeted in some Smart
TV’s.
• Developed by Canonical
Ltd. and released back in
2004.
Kali Linux
• Kali Linux is a specialized
distribution.
• Primarily designed for
purposes like Penetration
Testing and Digital
Forensics.
• Developed by Offensive
Security Ltd. and released
on 13th March 2013.
DIFFERENT SOFTWARES FOR
PENTESTING
Kali Linux is preinstalled with over 600 penetration-testing
programs.
For eg-
nmap (a port scanner),
 Wireshark (a packet analyzer),
 John the Ripper (a password cracker),
 Aircrack-ng (a software suite for penetration-testing wireless
LANs)
Kali Linux can run natively when installed on a computer's hard
disk, can be booted from a live CD or live USB, or it can run within
a virtual machine.
USE OF KALI LINUX FOR HACKFLY
WIRELESS HACKING WITH KALI LINUX
Aircrack-ng
Aircrack-ng is the de facto penetration tool suite – essential for any wireless penetration tests or
assessments.
COMMANDS USED:
Airmon-ng-:the tool used to put wireless cards into monitor mode
Airodump-ng :is used for packet capturing of raw 802.11 frames
Aireplay-ng: is used to inject frames.
Airtun-ng :is a virtual tunnel interface creator
Airbase-ng: is multi-purpose tool aimed at attacking clients as opposed to the Access Point (AP)
itself.
Aircrack-ng:recover keys once enough data packets have been captured
What is the need and purpose of
packet injection within WiFi attacks
Wireless networks work in predefined modes and come with strict functional
restrictions.
Wireless attacks require a higher control over the lower layers of
communication in order to send and receive any kind of data.
 In the default mode (Station Infrastructure Mode),, you can't even directly
talk to a different client in default mode.
For more control, you need Monitor mode to listen to any communication in
the air.
This is where packet injection comes in.
Packet injection means sending data while in Monitor mode because it's a
passive-only mode .
Sending and receiving management and control
frames is necessary for impersonating base stations
and clients, and for listening to frames that are
meant for specific adapters.
 The dreadful deauthentication frame, apart from
the DoS(denial of service attack) can also be
injected, it's the first stage in a multi-stage attack.
HARDWARE USED
Network Adapter for wireless network hack
Model-: Alfa Network AWUS036NH 2000mW High Power Wireless N 802.11bgn Wi-Fi USB
Adapter with 5dBi Antenna

More Related Content

What's hot

Kali Linux
Kali LinuxKali Linux
Kali Linux
Shubham Agrawal
 
Kali Linux
Kali LinuxKali Linux
Kali Linux
Sumit Singh
 
Kali linux
Kali linuxKali linux
Kali linux
AadhithyanPandian
 
penetration test using Kali linux ppt
penetration test using Kali linux pptpenetration test using Kali linux ppt
penetration test using Kali linux ppt
AbhayNaik8
 
kali linux
kali linux kali linux
kali linux
Avinash Hanwate
 
Kali linux os
Kali linux osKali linux os
Kali linux os
Samantha Lawrence
 
Linux - Introductions to Linux Operating System
Linux - Introductions to Linux Operating SystemLinux - Introductions to Linux Operating System
Linux - Introductions to Linux Operating System
Vibrant Technologies & Computers
 
penetration test using Kali linux seminar report
penetration test using Kali linux seminar reportpenetration test using Kali linux seminar report
penetration test using Kali linux seminar report
AbhayNaik8
 
linux vs window
linux vs windowlinux vs window
linux vs window
Khaliq ur Rehman
 
Presentation1 linux os
Presentation1 linux osPresentation1 linux os
Presentation1 linux osjoycoronado
 
Linux
LinuxLinux
Linux
salamassh
 
Kali linux.ppt
Kali linux.pptKali linux.ppt
Kali linux.ppt
Ahmedalhassar1
 
Google Fuchsia
Google FuchsiaGoogle Fuchsia
Google Fuchsia
Jai Sadana
 
Linux history & features
Linux history & featuresLinux history & features
Linux history & featuresRohit Kumar
 
OpenShift Meetup - Tokyo - Service Mesh and Serverless Overview
OpenShift Meetup - Tokyo - Service Mesh and Serverless OverviewOpenShift Meetup - Tokyo - Service Mesh and Serverless Overview
OpenShift Meetup - Tokyo - Service Mesh and Serverless Overview
María Angélica Bracho
 
A History of Linux
A History of LinuxA History of Linux
A History of Linux
Damian T. Gordon
 
Linux introduction
Linux introductionLinux introduction
Linux introduction
Md. Zahid Hossain Shoeb
 
Linux fundamentals
Linux fundamentalsLinux fundamentals
Linux fundamentalsRaghu nath
 
Linux vs Windows | Edureka
Linux vs Windows | EdurekaLinux vs Windows | Edureka
Linux vs Windows | Edureka
Edureka!
 

What's hot (20)

Kali Linux
Kali LinuxKali Linux
Kali Linux
 
Kali Linux
Kali LinuxKali Linux
Kali Linux
 
Kali linux
Kali linuxKali linux
Kali linux
 
penetration test using Kali linux ppt
penetration test using Kali linux pptpenetration test using Kali linux ppt
penetration test using Kali linux ppt
 
kali linux
kali linux kali linux
kali linux
 
Kali linux os
Kali linux osKali linux os
Kali linux os
 
Linux - Introductions to Linux Operating System
Linux - Introductions to Linux Operating SystemLinux - Introductions to Linux Operating System
Linux - Introductions to Linux Operating System
 
penetration test using Kali linux seminar report
penetration test using Kali linux seminar reportpenetration test using Kali linux seminar report
penetration test using Kali linux seminar report
 
linux vs window
linux vs windowlinux vs window
linux vs window
 
Presentation1 linux os
Presentation1 linux osPresentation1 linux os
Presentation1 linux os
 
Linux
LinuxLinux
Linux
 
Kali linux.ppt
Kali linux.pptKali linux.ppt
Kali linux.ppt
 
Google Fuchsia
Google FuchsiaGoogle Fuchsia
Google Fuchsia
 
Linux history & features
Linux history & featuresLinux history & features
Linux history & features
 
OpenShift Meetup - Tokyo - Service Mesh and Serverless Overview
OpenShift Meetup - Tokyo - Service Mesh and Serverless OverviewOpenShift Meetup - Tokyo - Service Mesh and Serverless Overview
OpenShift Meetup - Tokyo - Service Mesh and Serverless Overview
 
A History of Linux
A History of LinuxA History of Linux
A History of Linux
 
Linux basics
Linux basicsLinux basics
Linux basics
 
Linux introduction
Linux introductionLinux introduction
Linux introduction
 
Linux fundamentals
Linux fundamentalsLinux fundamentals
Linux fundamentals
 
Linux vs Windows | Edureka
Linux vs Windows | EdurekaLinux vs Windows | Edureka
Linux vs Windows | Edureka
 

Viewers also liked

BASIC OVERVIEW OF KALI LINUX
BASIC OVERVIEW OF KALI LINUXBASIC OVERVIEW OF KALI LINUX
BASIC OVERVIEW OF KALI LINUX
Deborah Akuoko
 
The Challenge of Locating ‘Culture’ in Location-Based Games
The Challenge of Locating ‘Culture’ in Location-Based GamesThe Challenge of Locating ‘Culture’ in Location-Based Games
The Challenge of Locating ‘Culture’ in Location-Based Games
Kyle Moore
 
(03 2013) guide to kali linux
(03 2013)   guide to kali linux(03 2013)   guide to kali linux
(03 2013) guide to kali linux
julius77
 
Kali linux
Kali linuxKali linux
Kali linux
MaryamAlR
 
Kali linux
Kali linuxKali linux
Kali linux
Harsh Gor
 
Tools kali
Tools kaliTools kali
Tools kali
ketban0702
 
Hack wifi password using kali linux
Hack wifi password using kali linuxHack wifi password using kali linux
Hack wifi password using kali linux
Helder Oliveira
 
Kali Linux - CleveSec 2015
Kali Linux - CleveSec 2015Kali Linux - CleveSec 2015
Kali Linux - CleveSec 2015TGodfrey
 
Kali Linux - Falconer
Kali Linux - FalconerKali Linux - Falconer
Kali Linux - Falconer
Tony Godfrey
 

Viewers also liked (9)

BASIC OVERVIEW OF KALI LINUX
BASIC OVERVIEW OF KALI LINUXBASIC OVERVIEW OF KALI LINUX
BASIC OVERVIEW OF KALI LINUX
 
The Challenge of Locating ‘Culture’ in Location-Based Games
The Challenge of Locating ‘Culture’ in Location-Based GamesThe Challenge of Locating ‘Culture’ in Location-Based Games
The Challenge of Locating ‘Culture’ in Location-Based Games
 
(03 2013) guide to kali linux
(03 2013)   guide to kali linux(03 2013)   guide to kali linux
(03 2013) guide to kali linux
 
Kali linux
Kali linuxKali linux
Kali linux
 
Kali linux
Kali linuxKali linux
Kali linux
 
Tools kali
Tools kaliTools kali
Tools kali
 
Hack wifi password using kali linux
Hack wifi password using kali linuxHack wifi password using kali linux
Hack wifi password using kali linux
 
Kali Linux - CleveSec 2015
Kali Linux - CleveSec 2015Kali Linux - CleveSec 2015
Kali Linux - CleveSec 2015
 
Kali Linux - Falconer
Kali Linux - FalconerKali Linux - Falconer
Kali Linux - Falconer
 

Similar to Kali linux summarised

Kalilinux
KalilinuxKalilinux
Kalilinux
haha loser
 
kali linix
kali linixkali linix
kali linix
Mirza Baig
 
Kali kinux1
Kali kinux1Kali kinux1
Kali kinux1
Mohammad Mafi
 
Attacking Embedded Devices (No Axe Required)
Attacking Embedded Devices (No Axe Required)Attacking Embedded Devices (No Axe Required)
Attacking Embedded Devices (No Axe Required)
Security Weekly
 
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Novell
 
The Perfect Linux Security Firewalls
The Perfect Linux Security Firewalls The Perfect Linux Security Firewalls
The Perfect Linux Security Firewalls
david rom
 
Firewalls
FirewallsFirewalls
Firewalls
junaid15bsse
 
Eliz seminar
Eliz seminar Eliz seminar
Eliz seminar
henelpj
 
Firewall ppt.pptx
Firewall ppt.pptxFirewall ppt.pptx
Firewall ppt.pptx
BhushanLokhande12
 
Operating system
Operating systemOperating system
Operating system
KartikeyBanjara1
 
Geek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the InternetGeek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the Internet
GeekNightHyderabad
 
Shamsa altayer 10bg kali linux
Shamsa altayer 10bg   kali linuxShamsa altayer 10bg   kali linux
Shamsa altayer 10bg kali linux
shamsaot
 
Unleash the Power: How to Install Kali Linux With a Twist
Unleash the Power: How to Install Kali Linux With a TwistUnleash the Power: How to Install Kali Linux With a Twist
Unleash the Power: How to Install Kali Linux With a Twist
FredReynolds2
 
ML13198A410.pdf
ML13198A410.pdfML13198A410.pdf
ML13198A410.pdf
ParasPatel967737
 
ML13198A410.pdf
ML13198A410.pdfML13198A410.pdf
ML13198A410.pdf
KalsoomTahir2
 
ML13198A410.pdf
ML13198A410.pdfML13198A410.pdf
ML13198A410.pdf
ParvezAhmed59842
 
kali linux.pptx
kali linux.pptxkali linux.pptx
kali linux.pptx
AdityaKumar1548
 
Operating project
Operating projectOperating project
Operating project
ISMAT CH
 
kali linux.pptx
kali linux.pptxkali linux.pptx
kali linux.pptx
itdepartmentkct
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
Amazon Web Services
 

Similar to Kali linux summarised (20)

Kalilinux
KalilinuxKalilinux
Kalilinux
 
kali linix
kali linixkali linix
kali linix
 
Kali kinux1
Kali kinux1Kali kinux1
Kali kinux1
 
Attacking Embedded Devices (No Axe Required)
Attacking Embedded Devices (No Axe Required)Attacking Embedded Devices (No Axe Required)
Attacking Embedded Devices (No Axe Required)
 
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
 
The Perfect Linux Security Firewalls
The Perfect Linux Security Firewalls The Perfect Linux Security Firewalls
The Perfect Linux Security Firewalls
 
Firewalls
FirewallsFirewalls
Firewalls
 
Eliz seminar
Eliz seminar Eliz seminar
Eliz seminar
 
Firewall ppt.pptx
Firewall ppt.pptxFirewall ppt.pptx
Firewall ppt.pptx
 
Operating system
Operating systemOperating system
Operating system
 
Geek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the InternetGeek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the Internet
 
Shamsa altayer 10bg kali linux
Shamsa altayer 10bg   kali linuxShamsa altayer 10bg   kali linux
Shamsa altayer 10bg kali linux
 
Unleash the Power: How to Install Kali Linux With a Twist
Unleash the Power: How to Install Kali Linux With a TwistUnleash the Power: How to Install Kali Linux With a Twist
Unleash the Power: How to Install Kali Linux With a Twist
 
ML13198A410.pdf
ML13198A410.pdfML13198A410.pdf
ML13198A410.pdf
 
ML13198A410.pdf
ML13198A410.pdfML13198A410.pdf
ML13198A410.pdf
 
ML13198A410.pdf
ML13198A410.pdfML13198A410.pdf
ML13198A410.pdf
 
kali linux.pptx
kali linux.pptxkali linux.pptx
kali linux.pptx
 
Operating project
Operating projectOperating project
Operating project
 
kali linux.pptx
kali linux.pptxkali linux.pptx
kali linux.pptx
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
 

Recently uploaded

Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket ManagementUtilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
Łukasz Chruściel
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
Boni García
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Neo4j
 
AI Genie Review: World’s First Open AI WordPress Website Creator
AI Genie Review: World’s First Open AI WordPress Website CreatorAI Genie Review: World’s First Open AI WordPress Website Creator
AI Genie Review: World’s First Open AI WordPress Website Creator
Google
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
Adele Miller
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
NYGGS Automation Suite
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
Google
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
Ayan Halder
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
Rakesh Kumar R
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Mind IT Systems
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
Octavian Nadolu
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
Deuglo Infosystem Pvt Ltd
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
Aftab Hussain
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
Philip Schwarz
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
rickgrimesss22
 

Recently uploaded (20)

Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket ManagementUtilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
 
AI Genie Review: World’s First Open AI WordPress Website Creator
AI Genie Review: World’s First Open AI WordPress Website CreatorAI Genie Review: World’s First Open AI WordPress Website Creator
AI Genie Review: World’s First Open AI WordPress Website Creator
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
 

Kali linux summarised

  • 2. KALI LINUX is a Debian-derived Linux distribution designed for digital forensics and penetration testing. It is maintained and funded by Offensive Security Ltd. It was developed by MatiAharoni and Devon Kearns of Offensive Security  It is the rewrite of BackTrack, their previous forensics Linux distribution. KALI LINUX:PENETRATION TESTING OPERATING SYSTEM
  • 3. What is Penetration Testing? “The process of evaluating systems , applications , and protocols with the intent of identifying vulnerabilities usually from the perspective of an unprivileged or anonymous user to determine potential real world impacts…” Or in other words … trying to break into stuff before the bad guys do…
  • 4. Features of KALI LINUX • Has more than 600 penetration testing tools. • Multilingual Support • Completely Customizable. • Free and Always will be. • Vast Wireless device support and Compatible with USB. • ARM support-Kali Linux has ARM repositories integrated with mainline distribution.
  • 5. Flexibility of KALI LINUX • Kali Linux can run natively when installed on a computer’s hard disk or, • Can be booted from a live CD or a live USB or, • It can run within a virtual machine. • Available for ARM devices like Samsung Chromebook, Samsung Galaxy Note 10.1, Raspberry Pi and a lot more. • KALI LINUX can also be installed within a root environment on an android device.
  • 6. Difference between Kali Linux and Ubuntu Ubuntu • Ubuntu is a general desktop and server distribution. • Designed to satisfy general Desktop and Server requirements and also targeted in some Smart TV’s. • Developed by Canonical Ltd. and released back in 2004. Kali Linux • Kali Linux is a specialized distribution. • Primarily designed for purposes like Penetration Testing and Digital Forensics. • Developed by Offensive Security Ltd. and released on 13th March 2013.
  • 7. DIFFERENT SOFTWARES FOR PENTESTING Kali Linux is preinstalled with over 600 penetration-testing programs. For eg- nmap (a port scanner),  Wireshark (a packet analyzer),  John the Ripper (a password cracker),  Aircrack-ng (a software suite for penetration-testing wireless LANs) Kali Linux can run natively when installed on a computer's hard disk, can be booted from a live CD or live USB, or it can run within a virtual machine.
  • 8. USE OF KALI LINUX FOR HACKFLY WIRELESS HACKING WITH KALI LINUX Aircrack-ng Aircrack-ng is the de facto penetration tool suite – essential for any wireless penetration tests or assessments. COMMANDS USED: Airmon-ng-:the tool used to put wireless cards into monitor mode Airodump-ng :is used for packet capturing of raw 802.11 frames Aireplay-ng: is used to inject frames. Airtun-ng :is a virtual tunnel interface creator Airbase-ng: is multi-purpose tool aimed at attacking clients as opposed to the Access Point (AP) itself. Aircrack-ng:recover keys once enough data packets have been captured
  • 9. What is the need and purpose of packet injection within WiFi attacks Wireless networks work in predefined modes and come with strict functional restrictions. Wireless attacks require a higher control over the lower layers of communication in order to send and receive any kind of data.  In the default mode (Station Infrastructure Mode),, you can't even directly talk to a different client in default mode. For more control, you need Monitor mode to listen to any communication in the air. This is where packet injection comes in. Packet injection means sending data while in Monitor mode because it's a passive-only mode .
  • 10. Sending and receiving management and control frames is necessary for impersonating base stations and clients, and for listening to frames that are meant for specific adapters.  The dreadful deauthentication frame, apart from the DoS(denial of service attack) can also be injected, it's the first stage in a multi-stage attack.
  • 11. HARDWARE USED Network Adapter for wireless network hack Model-: Alfa Network AWUS036NH 2000mW High Power Wireless N 802.11bgn Wi-Fi USB Adapter with 5dBi Antenna