(Subject) Computer system
(instructor) Sir Haroon
Group Member
• Ishtiaq Husain
• Zain Ul Abadin
• Adeel manaf
• Muhammad Awais
• Nouman Ahmad
Before Our topic....!!
Definition
Kali Linux is an operating system
Use for advanced Penetration Testing and Security Auditing
Named on Hindu god.
It was designed to replace the BackTrack Linux
Interface of Kali Linux
Mati Aharoni
Kali Linux Core Developers Mati Aharoni is the
lead Kali developer, trainer and founder of
Offensive Security. With over 10 years of
experience as a professional penetration tester, he
has uncovered several major security flaws and is
actively involved in the offensive security area.
Founders of Kali Linux
Devon Kearns
Devon Kearns (dookie) is an Offensive Security
instructor, Kali Linux developer, the administrator
of the Exploit Database, co-creator of the
Metasploit Unleashed project, fanatic, and co-
author of Penetration Tester’s Guide
Offensive security
Offensive Security is an organization that offers
Offensive Security certification Professional
(OSCP) is an ethical hacking certification that
teaches penetration testing for organization.
Hardware requirement
• A minimum of 20 GB disk space for the Kali
Linux install.
• RAM for i386 and amd64
architectures, minimum: 1GB, recommended
2GB or more.
• CD-DVD Drive / USB boot support
Installation of Kali
STEP 1 : Boot with your chosen medium or load the Kali
STEP 2 : Select your preferred language
STEP 3 : Select your geographical location
STEP 4 : Select the preferred keyboard
STEP 5 : Let kali be your hostname & hit continue
STEP 6 : Set a password for your Kali Machine & hit continue
Installation of Kali
STEP 7 : set your time zone.
STEP 8 : partitions of the disk.
STEP 9 : Configure network mirrors( it is use to supplement the
software that is included on cd room)
STEP 10:install GRUB(places the operating system (OS) of a computer into memory.)
STEP 11: Finally, click ,Continue to reboot into your new
Kali installation
What is source of earn of kali
developers…???
Feature of Kali
• Has more than 300 penetration testing tools.
• Multilingual Support
• Completely Customizable.
• Free and Always will be.
• Vast Wireless device support and Compatible
with USB
• ARM support
• Trustable Operating System
• Forensics Mode(recovery and investigation of
data )
Metasploit framework
• Metasploit framework best and no1 tool in kali
linux with backdooring attacks. Msf can target any
kind of system including windows, mac, linux,
android and even cctv cameras. Msf can generate
a backdoor and control the infected system with its
handler.
SQLmap
• in penetration testing most of the hackers tries to take
down a database in the first place while attacking a
web server. sqlmap is really powerful fully automated
auditing tool for attacking a database by exploiting a
server side sql vulnerability. Sqlmap comes with a
command line interface with cool green fonts.
• You just need to input the vulnerable link rest is fully
automated process
Reaver
• Reaver is the best and simple tool for wireless
penetration testing. Reaver targets a WPS
(Wireless protected setup) enabled router.
• This simple tool can crack wifi within a very
short time depending on the wps pin length.
Nmap 65535
• Nmap, also known as network mapper is a pretty
simple tool in Kali Linux that allows you to scan a
system or a network. Nmap allows you to scan
open ports, running.
• Nmap uses various type of detection technique to
check IP filters firewalls. Nmap has both command
line interface and GUI and supports almost all
platforms including windows and mac.
Hashcat
• Hashcat is an awesome piece of software that can crack
almost any kind of hash. Hashcat has two variants with
two different algorithms one is CPU cracking other one
is GPU cracking. HashCat uses the GPU cracking
algorithm which is very faster than traditional CPU
cracking. Unlike a CPU a GPU has too many number of
cores
Aircrack
• Aircrack is not just a tool its toolkit that is used for
wireless attacks or simply hacking a wifi
network. These set of tools allows you to monitor a
network, crack WPA hash, capture handshake.
• The most interesting part is this can be used as a wifi
jammer by sending unlimited false packet to a router
and thus disconnects all the connected devices.
Proxychains
• Proxychains is one of the most essential tools in kali
linux. Proxychains directs all traffic of a specific
application through a desired proxy server. Its can mask
the user’s identity and secure the user from
eavesdroppers. By default proxychains is set to connect
through tor proxy servers with more secure protocol
called SOCKS5.
Kali Vs. Ubuntu
Kali
 Kali Linux is a specialized
distribution.
 Kali is purely operate by
professional penetrator
 Primarily designed for
purposes like Penetration
Testing and Digital
Forensics.
 Developed by Offensive
Security Ltd. and released
on 13th March 2013.
Ubuntu
 Ubuntu is a general desktop
and server distribution.
 Ubuntu is more friendly to
Linux beginners
 Designed to satisfy general
desktop and Server
requirements and also targeted
in some Smart TV’s.
 Developed by Canonical Ltd.
and released back in 2004
Refrence
• http://www.en.wikipedia.org/wiki/Kali_Linuxwww.slideshare.net
• http://www.learncodeonline.in/blog/how-to-install-kali-lilnux
• https://tools.kali.org/tools-listing
• https://www.technotification.com/2017/06/kali-linux-tools-hacking-wifi.htm
• https://www.fossmint.com/kali-linux-hacking-andpenetration-tools/
• https://metasploit.help.rapid7.com/docs/msf-overview
• http://www.pearsonitcertification.com/articles/article.aspx?p=1868080
• https://superuser.com
“IT IS CRITICAL TO TAKE THE VIEW OF THE ATTACKER
TO SEE IF YOUR DEFENSES ARE WORKING”
Thank you

Kali presentation

  • 2.
  • 3.
    Group Member • IshtiaqHusain • Zain Ul Abadin • Adeel manaf • Muhammad Awais • Nouman Ahmad
  • 4.
  • 6.
    Definition Kali Linux isan operating system Use for advanced Penetration Testing and Security Auditing Named on Hindu god. It was designed to replace the BackTrack Linux
  • 7.
  • 8.
    Mati Aharoni Kali LinuxCore Developers Mati Aharoni is the lead Kali developer, trainer and founder of Offensive Security. With over 10 years of experience as a professional penetration tester, he has uncovered several major security flaws and is actively involved in the offensive security area. Founders of Kali Linux
  • 9.
    Devon Kearns Devon Kearns(dookie) is an Offensive Security instructor, Kali Linux developer, the administrator of the Exploit Database, co-creator of the Metasploit Unleashed project, fanatic, and co- author of Penetration Tester’s Guide
  • 10.
    Offensive security Offensive Securityis an organization that offers Offensive Security certification Professional (OSCP) is an ethical hacking certification that teaches penetration testing for organization.
  • 11.
    Hardware requirement • Aminimum of 20 GB disk space for the Kali Linux install. • RAM for i386 and amd64 architectures, minimum: 1GB, recommended 2GB or more. • CD-DVD Drive / USB boot support
  • 12.
    Installation of Kali STEP1 : Boot with your chosen medium or load the Kali STEP 2 : Select your preferred language STEP 3 : Select your geographical location STEP 4 : Select the preferred keyboard STEP 5 : Let kali be your hostname & hit continue STEP 6 : Set a password for your Kali Machine & hit continue
  • 13.
    Installation of Kali STEP7 : set your time zone. STEP 8 : partitions of the disk. STEP 9 : Configure network mirrors( it is use to supplement the software that is included on cd room) STEP 10:install GRUB(places the operating system (OS) of a computer into memory.) STEP 11: Finally, click ,Continue to reboot into your new Kali installation
  • 14.
    What is sourceof earn of kali developers…???
  • 15.
    Feature of Kali •Has more than 300 penetration testing tools. • Multilingual Support • Completely Customizable. • Free and Always will be. • Vast Wireless device support and Compatible with USB • ARM support • Trustable Operating System • Forensics Mode(recovery and investigation of data )
  • 16.
    Metasploit framework • Metasploitframework best and no1 tool in kali linux with backdooring attacks. Msf can target any kind of system including windows, mac, linux, android and even cctv cameras. Msf can generate a backdoor and control the infected system with its handler.
  • 17.
    SQLmap • in penetrationtesting most of the hackers tries to take down a database in the first place while attacking a web server. sqlmap is really powerful fully automated auditing tool for attacking a database by exploiting a server side sql vulnerability. Sqlmap comes with a command line interface with cool green fonts. • You just need to input the vulnerable link rest is fully automated process
  • 18.
    Reaver • Reaver isthe best and simple tool for wireless penetration testing. Reaver targets a WPS (Wireless protected setup) enabled router. • This simple tool can crack wifi within a very short time depending on the wps pin length.
  • 19.
    Nmap 65535 • Nmap,also known as network mapper is a pretty simple tool in Kali Linux that allows you to scan a system or a network. Nmap allows you to scan open ports, running. • Nmap uses various type of detection technique to check IP filters firewalls. Nmap has both command line interface and GUI and supports almost all platforms including windows and mac.
  • 20.
    Hashcat • Hashcat isan awesome piece of software that can crack almost any kind of hash. Hashcat has two variants with two different algorithms one is CPU cracking other one is GPU cracking. HashCat uses the GPU cracking algorithm which is very faster than traditional CPU cracking. Unlike a CPU a GPU has too many number of cores
  • 21.
    Aircrack • Aircrack isnot just a tool its toolkit that is used for wireless attacks or simply hacking a wifi network. These set of tools allows you to monitor a network, crack WPA hash, capture handshake. • The most interesting part is this can be used as a wifi jammer by sending unlimited false packet to a router and thus disconnects all the connected devices.
  • 22.
    Proxychains • Proxychains isone of the most essential tools in kali linux. Proxychains directs all traffic of a specific application through a desired proxy server. Its can mask the user’s identity and secure the user from eavesdroppers. By default proxychains is set to connect through tor proxy servers with more secure protocol called SOCKS5.
  • 23.
    Kali Vs. Ubuntu Kali Kali Linux is a specialized distribution.  Kali is purely operate by professional penetrator  Primarily designed for purposes like Penetration Testing and Digital Forensics.  Developed by Offensive Security Ltd. and released on 13th March 2013. Ubuntu  Ubuntu is a general desktop and server distribution.  Ubuntu is more friendly to Linux beginners  Designed to satisfy general desktop and Server requirements and also targeted in some Smart TV’s.  Developed by Canonical Ltd. and released back in 2004
  • 24.
    Refrence • http://www.en.wikipedia.org/wiki/Kali_Linuxwww.slideshare.net • http://www.learncodeonline.in/blog/how-to-install-kali-lilnux •https://tools.kali.org/tools-listing • https://www.technotification.com/2017/06/kali-linux-tools-hacking-wifi.htm • https://www.fossmint.com/kali-linux-hacking-andpenetration-tools/ • https://metasploit.help.rapid7.com/docs/msf-overview • http://www.pearsonitcertification.com/articles/article.aspx?p=1868080 • https://superuser.com
  • 25.
    “IT IS CRITICALTO TAKE THE VIEW OF THE ATTACKER TO SEE IF YOUR DEFENSES ARE WORKING” Thank you