SlideShare a Scribd company logo
KALI LINUX
COURSE
1. INTRODUCTION TO KALI LINUX
2. DOWNLOADING & INSTALLING KALI
3. UNDERSTANDING KALI LINUX INTERFACE
4. BASIC COMMANDS AND OPERATIONS
5. DIRECTORY TREE HIERARCHY IN LINUX
6. TYPES OF USERS IN KALI LINUX
7. FILES PERMISSIONS AND USERS GROUPS
8. HOW TO INSTALL PACKAGES IN LINUX
9. TRYING PHISHING (HIDDENEYE) IN KALI
10.TRYING DATA HIDING (STEGHIDE) IN KALI
11.TRYING KEYLOGGER (BEELOGGER) IN KALI
12.TRYING NMAP (NETWORK MAPPER) IN KALI
13.BASH SCRIPTING BASICS
TOPICS
1. Introduction to KALI LINUX
Kali Linux?
Kali Linux is a Debian-derived Linux distribution that is maintained by Offensive
Security. It was developed by Mati Aharoni and Devon Kearns. Kali Linux is a
specially designed OS for network analysts, Penetration testers, or in simple words,
it is for those who work under the umbrella of cybersecurity and analysis. The
official website of Kali Linux is Kali.org.
Advantages:
•It has 600+ Penetration testing and network security tools pre-installed.
•It is completely free and open source. So you can use it for free and even contribute for its
development.
•It supports many laguages.
•Great for those who are intermediate in linux and have their hands on Linux commands.
•Could be easily used with Rasberry Pi.
Disadvanatges:
•It is not recommended for those who are new to linux and want to learn linux.
•It is a bit slower.
•It is Quite unfamiliar
•Kernel :- The kernel is a computer program that is the core of a computer’s operating system,
with complete control over everything in the system. It manages following resources of the
Linux like File management, Process management, I/O management, Memory management,
Device management
•Shell :- A shell is special user program which provide an interface to user to use operating
system services. Shell accept human readable commands from user and convert them into
something which kernel can understand. It is a command language interpreter that execute
commands read from input devices such as keyboards or from files. Shell gets started when
the user logs in or start the terminal.
•Terminal :- We can say the terminal is a dumb thing so it does not know what to do with the
input, so it needs another program to process it. The terminal is a program that provides the
user with a simple command-line interface.
•Console :- In the case of Windows OS, the “Console” performs the same operations
performed by the terminal, so we can say for Windows OS, the Console is the alias name for
the Terminal.
Shell Scripting :- As shell can also take commands as input from file we can write these
commands in a file and can execute them in shell to avoid this repetitive work. These files are
called Shell Scripts or Shell Programs. Shell scripts are similar to the batch file in MS-DOS.
2. Downloading & Installing Kali Linux
Let’s Get Started
3. Understanding Kali Linux Interface
Let’s Get Started
4. Basic Commands and Operations
Let’s Get Started
5. Directory Tree Hierarchy in Linux
Tree Hierarchy
Let’s Verify it!
6. Types of Users in kali Linux
Types of Users
Let’s Verify it!
7. Files Permissions and Users Groups
Users and groups are used on GNU/Linux for access control—that is, to control access to
the system's files, directories, and peripherals. Linux offers relatively simple/coarse access
control mechanisms by default.
Users & Groups
On a Linux system, each file and directory is assigned access rights for the owner of
the file, the members of a group of related users, and everybody else. Rights can be
assigned to read a file, to write a file, and to execute a file (i.e., run the file as a program).
Files Permissions
8. How to Install Packages in Linux
Packages ???
Let’s Try it!
9. Trying Phishing in Kali Linux
Phishing is a type of social engineering attack often used to steal user data, including
login credentials and credit card numbers. It occurs when an attacker, masquerading as a
trusted entity, dupes a victim into opening an email, instant message, or text message.
Phishing?
HiddenEye is an advanced phishing tool that has some additional features like
keylogging and location tracking. The tool supports almost all major social media, e-
commerce, and business pages to be used as an attack vector against online targets.
Hidden Eye?
Let’s Try it!
10. Trying Steghide in Kali Linux
Cybercriminals now tunnel their malicious data to your devices in a different way. It's
called “steganography”—and it involves hiding a document, video, or photograph inside
another file that seems legit. ... The technique makes it easy for criminals to
surreptitiously transmit data-stealing malware
Stenography?
Steghide is a steganography program that is able to hide data in various kinds of
image- and audio-files. The color- respectivly sample-frequencies are not changed thus
making the embedding resistant against first-order statistical tests.
StegHide?
Let’s Try it!
11. Trying Keylogger in Kali Linux
Keyloggers or keystroke loggers are software programs or hardware devices that track
the activities (keys pressed) of a keyboard. ... Keylogger software typically stores your
keystrokes in a small file, which is either accessed later or automatically emailed to the
person monitoring your actions.
Keylogger?
Beelogger is a tool which works like Keylogger in Kali Linux. It records your activities,
strokes & Steps and mail all the logs to hackers given destination email address.
BEELOGGER?
Let’s Try it!
12. Trying NMAP in Kali Linux
Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery
and security auditing. Many systems and network administrators also find it useful for
tasks such as network inventory, managing service upgrade schedules, and monitoring
host or service uptime.
NMAP?
Let’s Try it!
13. BASH Scripting in Kali Linux
Bash is a Unix shell, which is a command line interface (CLI) for interacting with
an operating system (OS). Any command that you can run from the command line
can be used in a bash script. Scripts are used to run a series of
commands. Bash is available by default on Linux and macOS operating systems.
BASH SCRIPTING?
1.Variables (with Datatypes)
2.Comments
3.If-else Statement
4.Switch case Statement
5.Taking input
6.Showing output
7.Operators
8.Arrays
9.Loops
10.Functions
Let’s do it!

More Related Content

What's hot

Linux Operating System
Linux Operating SystemLinux Operating System
Linux Operating System
Avnish Khandelwal
 
Linux OS presentation
Linux OS presentationLinux OS presentation
Linux OS presentation
SahilGothoskar
 
Linux operating system ppt
Linux operating system pptLinux operating system ppt
Linux operating system ppt
Achyut Sinha
 
1 introduction to linux os
1 introduction to linux os1 introduction to linux os
1 introduction to linux osSukkur IBA
 
ZendCon - Linux 101
ZendCon - Linux 101ZendCon - Linux 101
ZendCon - Linux 101
Justin Reock
 
Linux operating system
Linux operating systemLinux operating system
Linux operating system
ITz_1
 
Introduction to linux
Introduction to linuxIntroduction to linux
Introduction to linux
Stephen Ahiante
 
Linux Operating System
Linux Operating SystemLinux Operating System
Linux Operating System
KunalKewat1
 
Ppt af linux
Ppt af linuxPpt af linux
Linux - Introductions to Linux Operating System
Linux - Introductions to Linux Operating SystemLinux - Introductions to Linux Operating System
Linux - Introductions to Linux Operating System
Vibrant Technologies & Computers
 
Linux security introduction
Linux security introduction Linux security introduction
Linux security introduction
Mohamed Gad
 
BITS: Introduction to linux, distributions and installation
BITS: Introduction to linux, distributions and installationBITS: Introduction to linux, distributions and installation
BITS: Introduction to linux, distributions and installation
BITS
 
Linux os and its features
Linux os and its featuresLinux os and its features
Linux os and its features
Kadiresan Nagarattiname
 
Linux vs windows
Linux vs windowsLinux vs windows
Linux vs windows
Dhaivat Zala
 
Introduction to Linux OS
Introduction to Linux OSIntroduction to Linux OS
Introduction to Linux OSMohammed Safwat
 
Linux; Operating System
Linux; Operating SystemLinux; Operating System
Linux; Operating System
JayEl Cadawas
 
Linux operating system - Overview
Linux operating system - OverviewLinux operating system - Overview
Linux operating system - Overview
Ashita Agrawal
 

What's hot (20)

Linux Operating System
Linux Operating SystemLinux Operating System
Linux Operating System
 
Linux
LinuxLinux
Linux
 
Linux OS presentation
Linux OS presentationLinux OS presentation
Linux OS presentation
 
Linux operating system ppt
Linux operating system pptLinux operating system ppt
Linux operating system ppt
 
1 introduction to linux os
1 introduction to linux os1 introduction to linux os
1 introduction to linux os
 
ZendCon - Linux 101
ZendCon - Linux 101ZendCon - Linux 101
ZendCon - Linux 101
 
Linux operating system
Linux operating systemLinux operating system
Linux operating system
 
Introduction to linux
Introduction to linuxIntroduction to linux
Introduction to linux
 
Linux Operating System
Linux Operating SystemLinux Operating System
Linux Operating System
 
Linux seminar
Linux seminarLinux seminar
Linux seminar
 
Ppt af linux
Ppt af linuxPpt af linux
Ppt af linux
 
Linux - Introductions to Linux Operating System
Linux - Introductions to Linux Operating SystemLinux - Introductions to Linux Operating System
Linux - Introductions to Linux Operating System
 
Linux security introduction
Linux security introduction Linux security introduction
Linux security introduction
 
Linux vs windows
Linux vs windowsLinux vs windows
Linux vs windows
 
BITS: Introduction to linux, distributions and installation
BITS: Introduction to linux, distributions and installationBITS: Introduction to linux, distributions and installation
BITS: Introduction to linux, distributions and installation
 
Linux os and its features
Linux os and its featuresLinux os and its features
Linux os and its features
 
Linux vs windows
Linux vs windowsLinux vs windows
Linux vs windows
 
Introduction to Linux OS
Introduction to Linux OSIntroduction to Linux OS
Introduction to Linux OS
 
Linux; Operating System
Linux; Operating SystemLinux; Operating System
Linux; Operating System
 
Linux operating system - Overview
Linux operating system - OverviewLinux operating system - Overview
Linux operating system - Overview
 

Similar to kali linux.pptx

kali linux.pptx
kali linux.pptxkali linux.pptx
kali linux.pptx
itdepartmentkct
 
Kali linux.ppt
Kali linux.pptKali linux.ppt
Kali linux.ppt
Ahmedalhassar1
 
Unleash the Power: How to Install Kali Linux With a Twist
Unleash the Power: How to Install Kali Linux With a TwistUnleash the Power: How to Install Kali Linux With a Twist
Unleash the Power: How to Install Kali Linux With a Twist
FredReynolds2
 
Module 18 (linux hacking)
Module 18 (linux hacking)Module 18 (linux hacking)
Module 18 (linux hacking)
Wail Hassan
 
Operating project
Operating projectOperating project
Operating project
ISMAT CH
 
Module 4 qui parle de la sécurisation des applications
Module 4 qui parle de la sécurisation des applicationsModule 4 qui parle de la sécurisation des applications
Module 4 qui parle de la sécurisation des applications
EwenBenana
 
Ceh v5 module 18 linux hacking
Ceh v5 module 18 linux hackingCeh v5 module 18 linux hacking
Ceh v5 module 18 linux hacking
Vi Tính Hoàng Nam
 
Linux interview questions-ppt
Linux interview questions-pptLinux interview questions-ppt
Linux interview questions-ppt
Mayank Kumar
 
Red Hat Linux.pptx
Red Hat Linux.pptxRed Hat Linux.pptx
Red Hat Linux.pptx
ssuser16fc07
 
Kali Linux - CleveSec 2015
Kali Linux - CleveSec 2015Kali Linux - CleveSec 2015
Kali Linux - CleveSec 2015TGodfrey
 
introduction to linux operating system basic information
introduction to linux operating system basic informationintroduction to linux operating system basic information
introduction to linux operating system basic information
DILEEPSADHANKAR
 
Final project.ppt
Final project.pptFinal project.ppt
Final project.ppt
shreyng
 
Finalppt metasploit
Finalppt metasploitFinalppt metasploit
Finalppt metasploitdevilback
 
Kali Linux - Falconer - ISS 2014
Kali Linux - Falconer - ISS 2014Kali Linux - Falconer - ISS 2014
Kali Linux - Falconer - ISS 2014
TGodfrey
 
100 Security Operation Center Tools.pdf
100 Security Operation Center Tools.pdf100 Security Operation Center Tools.pdf
100 Security Operation Center Tools.pdf
MAHESHUMANATHGOPALAK
 
SOC-BlueTEam.pdf
SOC-BlueTEam.pdfSOC-BlueTEam.pdf
SOC-BlueTEam.pdf
BeratAkit
 
100 Security Operation Center Tools EMERSON EDUARDO RODRIGUES
100 Security Operation Center Tools EMERSON EDUARDO RODRIGUES100 Security Operation Center Tools EMERSON EDUARDO RODRIGUES
100 Security Operation Center Tools EMERSON EDUARDO RODRIGUES
EMERSON EDUARDO RODRIGUES
 
100 Security Operation Center Tools.pdf
100 Security Operation Center Tools.pdf100 Security Operation Center Tools.pdf
100 Security Operation Center Tools.pdf
EMERSON EDUARDO RODRIGUES
 
penetration test using Kali linux ppt
penetration test using Kali linux pptpenetration test using Kali linux ppt
penetration test using Kali linux ppt
AbhayNaik8
 

Similar to kali linux.pptx (20)

kali linux.pptx
kali linux.pptxkali linux.pptx
kali linux.pptx
 
Kali linux.ppt
Kali linux.pptKali linux.ppt
Kali linux.ppt
 
Unleash the Power: How to Install Kali Linux With a Twist
Unleash the Power: How to Install Kali Linux With a TwistUnleash the Power: How to Install Kali Linux With a Twist
Unleash the Power: How to Install Kali Linux With a Twist
 
Module 18 (linux hacking)
Module 18 (linux hacking)Module 18 (linux hacking)
Module 18 (linux hacking)
 
Operating project
Operating projectOperating project
Operating project
 
Module 4 qui parle de la sécurisation des applications
Module 4 qui parle de la sécurisation des applicationsModule 4 qui parle de la sécurisation des applications
Module 4 qui parle de la sécurisation des applications
 
Ceh v5 module 18 linux hacking
Ceh v5 module 18 linux hackingCeh v5 module 18 linux hacking
Ceh v5 module 18 linux hacking
 
Linux interview questions-ppt
Linux interview questions-pptLinux interview questions-ppt
Linux interview questions-ppt
 
Red Hat Linux.pptx
Red Hat Linux.pptxRed Hat Linux.pptx
Red Hat Linux.pptx
 
Kali Linux - CleveSec 2015
Kali Linux - CleveSec 2015Kali Linux - CleveSec 2015
Kali Linux - CleveSec 2015
 
introduction to linux operating system basic information
introduction to linux operating system basic informationintroduction to linux operating system basic information
introduction to linux operating system basic information
 
Final project.ppt
Final project.pptFinal project.ppt
Final project.ppt
 
Finalppt metasploit
Finalppt metasploitFinalppt metasploit
Finalppt metasploit
 
Kali Linux - Falconer - ISS 2014
Kali Linux - Falconer - ISS 2014Kali Linux - Falconer - ISS 2014
Kali Linux - Falconer - ISS 2014
 
100 Security Operation Center Tools.pdf
100 Security Operation Center Tools.pdf100 Security Operation Center Tools.pdf
100 Security Operation Center Tools.pdf
 
SOC-BlueTEam.pdf
SOC-BlueTEam.pdfSOC-BlueTEam.pdf
SOC-BlueTEam.pdf
 
100 Security Operation Center Tools EMERSON EDUARDO RODRIGUES
100 Security Operation Center Tools EMERSON EDUARDO RODRIGUES100 Security Operation Center Tools EMERSON EDUARDO RODRIGUES
100 Security Operation Center Tools EMERSON EDUARDO RODRIGUES
 
100 Security Operation Center Tools.pdf
100 Security Operation Center Tools.pdf100 Security Operation Center Tools.pdf
100 Security Operation Center Tools.pdf
 
penetration test using Kali linux ppt
penetration test using Kali linux pptpenetration test using Kali linux ppt
penetration test using Kali linux ppt
 
How to build an admin guy
How to build an admin guyHow to build an admin guy
How to build an admin guy
 

Recently uploaded

ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
Kamal Acharya
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 

Recently uploaded (20)

ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 

kali linux.pptx

  • 2. 1. INTRODUCTION TO KALI LINUX 2. DOWNLOADING & INSTALLING KALI 3. UNDERSTANDING KALI LINUX INTERFACE 4. BASIC COMMANDS AND OPERATIONS 5. DIRECTORY TREE HIERARCHY IN LINUX 6. TYPES OF USERS IN KALI LINUX 7. FILES PERMISSIONS AND USERS GROUPS 8. HOW TO INSTALL PACKAGES IN LINUX 9. TRYING PHISHING (HIDDENEYE) IN KALI 10.TRYING DATA HIDING (STEGHIDE) IN KALI 11.TRYING KEYLOGGER (BEELOGGER) IN KALI 12.TRYING NMAP (NETWORK MAPPER) IN KALI 13.BASH SCRIPTING BASICS TOPICS
  • 3. 1. Introduction to KALI LINUX
  • 4. Kali Linux? Kali Linux is a Debian-derived Linux distribution that is maintained by Offensive Security. It was developed by Mati Aharoni and Devon Kearns. Kali Linux is a specially designed OS for network analysts, Penetration testers, or in simple words, it is for those who work under the umbrella of cybersecurity and analysis. The official website of Kali Linux is Kali.org.
  • 5. Advantages: •It has 600+ Penetration testing and network security tools pre-installed. •It is completely free and open source. So you can use it for free and even contribute for its development. •It supports many laguages. •Great for those who are intermediate in linux and have their hands on Linux commands. •Could be easily used with Rasberry Pi. Disadvanatges: •It is not recommended for those who are new to linux and want to learn linux. •It is a bit slower. •It is Quite unfamiliar
  • 6. •Kernel :- The kernel is a computer program that is the core of a computer’s operating system, with complete control over everything in the system. It manages following resources of the Linux like File management, Process management, I/O management, Memory management, Device management •Shell :- A shell is special user program which provide an interface to user to use operating system services. Shell accept human readable commands from user and convert them into something which kernel can understand. It is a command language interpreter that execute commands read from input devices such as keyboards or from files. Shell gets started when the user logs in or start the terminal. •Terminal :- We can say the terminal is a dumb thing so it does not know what to do with the input, so it needs another program to process it. The terminal is a program that provides the user with a simple command-line interface. •Console :- In the case of Windows OS, the “Console” performs the same operations performed by the terminal, so we can say for Windows OS, the Console is the alias name for the Terminal. Shell Scripting :- As shell can also take commands as input from file we can write these commands in a file and can execute them in shell to avoid this repetitive work. These files are called Shell Scripts or Shell Programs. Shell scripts are similar to the batch file in MS-DOS.
  • 7. 2. Downloading & Installing Kali Linux
  • 9. 3. Understanding Kali Linux Interface
  • 11. 4. Basic Commands and Operations
  • 13. 5. Directory Tree Hierarchy in Linux
  • 16. 6. Types of Users in kali Linux
  • 19. 7. Files Permissions and Users Groups
  • 20. Users and groups are used on GNU/Linux for access control—that is, to control access to the system's files, directories, and peripherals. Linux offers relatively simple/coarse access control mechanisms by default. Users & Groups
  • 21. On a Linux system, each file and directory is assigned access rights for the owner of the file, the members of a group of related users, and everybody else. Rights can be assigned to read a file, to write a file, and to execute a file (i.e., run the file as a program). Files Permissions
  • 22.
  • 23. 8. How to Install Packages in Linux
  • 26. 9. Trying Phishing in Kali Linux
  • 27. Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message. Phishing?
  • 28. HiddenEye is an advanced phishing tool that has some additional features like keylogging and location tracking. The tool supports almost all major social media, e- commerce, and business pages to be used as an attack vector against online targets. Hidden Eye?
  • 30. 10. Trying Steghide in Kali Linux
  • 31. Cybercriminals now tunnel their malicious data to your devices in a different way. It's called “steganography”—and it involves hiding a document, video, or photograph inside another file that seems legit. ... The technique makes it easy for criminals to surreptitiously transmit data-stealing malware Stenography?
  • 32. Steghide is a steganography program that is able to hide data in various kinds of image- and audio-files. The color- respectivly sample-frequencies are not changed thus making the embedding resistant against first-order statistical tests. StegHide?
  • 34. 11. Trying Keylogger in Kali Linux
  • 35. Keyloggers or keystroke loggers are software programs or hardware devices that track the activities (keys pressed) of a keyboard. ... Keylogger software typically stores your keystrokes in a small file, which is either accessed later or automatically emailed to the person monitoring your actions. Keylogger?
  • 36. Beelogger is a tool which works like Keylogger in Kali Linux. It records your activities, strokes & Steps and mail all the logs to hackers given destination email address. BEELOGGER?
  • 38. 12. Trying NMAP in Kali Linux
  • 39. Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. NMAP?
  • 41. 13. BASH Scripting in Kali Linux
  • 42. Bash is a Unix shell, which is a command line interface (CLI) for interacting with an operating system (OS). Any command that you can run from the command line can be used in a bash script. Scripts are used to run a series of commands. Bash is available by default on Linux and macOS operating systems. BASH SCRIPTING?
  • 43. 1.Variables (with Datatypes) 2.Comments 3.If-else Statement 4.Switch case Statement 5.Taking input 6.Showing output 7.Operators 8.Arrays 9.Loops 10.Functions