SlideShare a Scribd company logo
Seminar On
Penetration Test Using Kali Linux
Submitted by
NAME : NAIK ABHAY SURESH
USN: 2JI15CS025
Guided by: Dr. Dinesha. H. A
CONTENTS
1. Introduction To Kali Linux
2. Introduction To Penetration Test
3. Literature Survey
4. Methodology
5. Advantages
6. Applications
7. Conclusion
8. References
Introduction
 Kali Linux is a Debian-based Linux distribution aimed
at advanced Penetration Testing and Security Auditing
services.
 Kali is packed with the tools which helps in achieving
goals towards various information security tasks, such as
Penetration Testing, Security research, Computer
Forensics and Reverse Engineering etc.
Introduction to Penetration
 Penetration Testing is the process of simulating attacks (on
purpose) on the system that needs to be flawed-free (i.e., there
should not be any holes) in order to stop a hacker or attacker to
follow out an attack along the organization.
 It deals with most of common things that usually a developer
forgets to cover during the development process. But, by the
magic of Penetration Testing it is possible to remove such kind
of holes in the application or in any system.
Literature Survey
 Devanshu Bhatt in his work on Modern Day Penetration
Testing Distribution Open Source Platform Kali Linux,
concluded that By utilizing Kali Linux–Open source
Distribution Framework and number of applications it supports
like Dmitry and Metasploit, he’s been able to get access on the
target Debian Linux machine. Kali Linux's Dmitry and
Metasploit Framework offers significant variety of exploits with
the collection of all operating system with available versions
and service packs.
METHODOLOGY
 Basically, the overall process of penetration testing can be
carved up into a no. of steps that make an inclusive
methodology of penetration testing
The phases of penetration testing are as follows:
 Information Gathering
 Scanning
 Exploitation
 Post Exploitation & Maintaining Access
Information Gathering
 This phase needs patience and lots of time, this phase generates
a massive amount of information about the target. The main
motto of Information Gathering is to collect as much
information as possible on the target. Kali Linux provides a
variety of tools for gathering information about the target.
Scanning
 This stage is the most important phase where the pen-tester
needs to identify the exposures of the target. This can be also
referred to as “Vulnerability Assessment”. The pen-tester uses
different tools and utilities to reveal the holes in the services,
ports and applications running on the host. Some kali linux
tools for Scanning are Webshag and Vega
Exploitation
 This process is nothing but the Exploitation process. In simple
words gaining access to the target using its vulnerabilities.
Exploitation delivers the payloads on the target in order to
forcefully grant the access into the target. There are different
types of exploits available over the Internet, but the widely
used is the “Metasploit Project”.
Post Exploitation
 This phase plays a crucial role in the penetration testing
process. Maintaining access to the target after the exploitation
is a very serious activity and needs to done carefully. in order
to achieve this “backdoors” are required to be created and
needs to be loaded on the target. Backdoors are nothing but a
piece of software that allows the unauthorized user to get into
the target at any time.
Why use Kali?
 It is FREE!!!!!
 300+ applications, from password crackers to digital forensics
software.
 Vast wireless device support (ARM processors).
 Completely Customizable.
 Multilingual Support.
 Secure Development Environment.
 Open source Git tree.
 Filesystem Hierarchy Standard (FHS) Compliant.
Application Menu
 Information Gathering
 Vulnerability Analysis
 Web Application Analysis
 Database Assessment
 Password Attacks
 Wireless Attacks
 Forensics
 Etc.
CONCLUSION
 Kali Linux is proved to be very useful and completely free
Operating System that can be used for the penetration testing.
 Penetration testing requires lots of time and patience to get the
results and to get them repaired. The Kali is a tool for the Linux
users to provide them numerous tricks in the security
department.
 Kali is packed with the tools which helps in achieving goals
towards various information security tasks, such as Penetration
Testing.
References
 Devanshu Bhatt’s paper on Modern Day Penetration Testing Distribution Open
Source Platform -Kali Linux. International journal of scientific & technology
research volume 7, issue 4 , April 2018.
 Gurdeep Singh and Jaswinder Singh’s paper on Evaluation of Penetration
Testing Tools of KALI LINUX. International Journal of Innovations &
Advancement in Computer Science IJIACS ISSN 2347 – 8616 Volume 5, Issue 9,
September 2016.
 Matthew Denis, Carlos Zena and Thaier Hayajneh’s paper on Penetration
Testing: Attack Methods, and Defence Strategies. IEEE paper, 29 April 2016.
 Suraj S. Mundalik’s paper on Penetration Testing: An Art of Securing the
System (Using Kali Linux). International Journal of Advanced Research in
Computer Science and Software Engineering Volume 5, Issue 10, October-2016.
 Kali Linux Revealed “Mastering the Penetration Testing Distribution” text
book by Raphaël Hertzog, Jim O’Gorman and Mati Aharoni 2017.
THANK YOU

More Related Content

What's hot

Ch 5: Port Scanning
Ch 5: Port ScanningCh 5: Port Scanning
Ch 5: Port Scanning
Sam Bowne
 
Metasploit
MetasploitMetasploit
Metasploit
henelpj
 
Kali linux.ppt
Kali linux.pptKali linux.ppt
Kali linux.ppt
Ahmedalhassar1
 
Threat Intelligence
Threat IntelligenceThreat Intelligence
Threat Intelligence
Deepak Kumar (D3)
 
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Edureka!
 
Linux security
Linux securityLinux security
Linux security
trilokchandra prakash
 
Penetration Testing
Penetration Testing Penetration Testing
Penetration Testing
RomSoft SRL
 
Kali Linux
Kali LinuxKali Linux
Kali Linux
Shubham Agrawal
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
Dilum Bandara
 
Malware analysis, threat intelligence and reverse engineering
Malware analysis, threat intelligence and reverse engineeringMalware analysis, threat intelligence and reverse engineering
Malware analysis, threat intelligence and reverse engineering
bartblaze
 
Pen Testing Explained
Pen Testing ExplainedPen Testing Explained
Pen Testing ExplainedRand W. Hirt
 
Nmap and metasploitable
Nmap and metasploitableNmap and metasploitable
Nmap and metasploitable
Mohammed Akbar Shariff
 
Penetration testing reporting and methodology
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodology
Rashad Aliyev
 
Malware Analysis Made Simple
Malware Analysis Made SimpleMalware Analysis Made Simple
Malware Analysis Made Simple
Paul Melson
 
Vapt life cycle
Vapt life cycleVapt life cycle
Vapt life cycle
penetration Tester
 
Red Team Framework
Red Team FrameworkRed Team Framework
Red Team Framework
👀 Joe Gray
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testing
Nezar Alazzabi
 
Cyber kill chain
Cyber kill chainCyber kill chain
Cyber kill chain
Ankita Ganguly
 
VAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptxVAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptx
DARSHANBHAVSAR14
 

What's hot (20)

Malware analysis
Malware analysisMalware analysis
Malware analysis
 
Ch 5: Port Scanning
Ch 5: Port ScanningCh 5: Port Scanning
Ch 5: Port Scanning
 
Metasploit
MetasploitMetasploit
Metasploit
 
Kali linux.ppt
Kali linux.pptKali linux.ppt
Kali linux.ppt
 
Threat Intelligence
Threat IntelligenceThreat Intelligence
Threat Intelligence
 
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
 
Linux security
Linux securityLinux security
Linux security
 
Penetration Testing
Penetration Testing Penetration Testing
Penetration Testing
 
Kali Linux
Kali LinuxKali Linux
Kali Linux
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 
Malware analysis, threat intelligence and reverse engineering
Malware analysis, threat intelligence and reverse engineeringMalware analysis, threat intelligence and reverse engineering
Malware analysis, threat intelligence and reverse engineering
 
Pen Testing Explained
Pen Testing ExplainedPen Testing Explained
Pen Testing Explained
 
Nmap and metasploitable
Nmap and metasploitableNmap and metasploitable
Nmap and metasploitable
 
Penetration testing reporting and methodology
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodology
 
Malware Analysis Made Simple
Malware Analysis Made SimpleMalware Analysis Made Simple
Malware Analysis Made Simple
 
Vapt life cycle
Vapt life cycleVapt life cycle
Vapt life cycle
 
Red Team Framework
Red Team FrameworkRed Team Framework
Red Team Framework
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testing
 
Cyber kill chain
Cyber kill chainCyber kill chain
Cyber kill chain
 
VAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptxVAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptx
 

Similar to penetration test using Kali linux ppt

IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET- Penetration Testing using Metasploit Framework: An Ethical ApproachIRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET Journal
 
A Comparison Study of Open Source Penetration Testing Tools
A Comparison Study of Open Source Penetration Testing ToolsA Comparison Study of Open Source Penetration Testing Tools
A Comparison Study of Open Source Penetration Testing Tools
ijtsrd
 
Metaploit
MetaploitMetaploit
Metaploit
Ajinkya Pathak
 
kali linux.pptx
kali linux.pptxkali linux.pptx
kali linux.pptx
AdityaKumar1548
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
abh.arya
 
Eliz seminar
Eliz seminar Eliz seminar
Eliz seminar
henelpj
 
Finalppt metasploit
Finalppt metasploitFinalppt metasploit
Finalppt metasploitdevilback
 
Software Security Assurance for DevOps
Software Security Assurance for DevOpsSoftware Security Assurance for DevOps
Software Security Assurance for DevOps
Black Duck by Synopsys
 
Penetration testing tools and phases
Penetration testing tools and phasesPenetration testing tools and phases
Penetration testing tools and phases
TestingXperts
 
Cybersecurity Free Tools for Practice Project.pdf
Cybersecurity Free Tools for Practice Project.pdfCybersecurity Free Tools for Practice Project.pdf
Cybersecurity Free Tools for Practice Project.pdf
Haris Chughtai
 
(03 2013) guide to kali linux
(03 2013)   guide to kali linux(03 2013)   guide to kali linux
(03 2013) guide to kali linux
julius77
 
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Mobodexter
 
A Comparative Study between Vulnerability Assessment and Penetration Testing
A Comparative Study between Vulnerability Assessment and Penetration TestingA Comparative Study between Vulnerability Assessment and Penetration Testing
A Comparative Study between Vulnerability Assessment and Penetration Testing
YogeshIJTSRD
 
Final project.ppt
Final project.pptFinal project.ppt
Final project.ppt
shreyng
 
kali linux.pptx
kali linux.pptxkali linux.pptx
kali linux.pptx
itdepartmentkct
 
Exploits Attack on Windows Vulnerabilities
Exploits Attack on Windows VulnerabilitiesExploits Attack on Windows Vulnerabilities
Exploits Attack on Windows VulnerabilitiesAmit Kumbhar
 
Linux/Unix Night - (PEN) Testing Toolkits (English)
Linux/Unix Night - (PEN) Testing Toolkits (English)Linux/Unix Night - (PEN) Testing Toolkits (English)
Linux/Unix Night - (PEN) Testing Toolkits (English)
Jelmer de Reus
 
Unleash the Power: How to Install Kali Linux With a Twist
Unleash the Power: How to Install Kali Linux With a TwistUnleash the Power: How to Install Kali Linux With a Twist
Unleash the Power: How to Install Kali Linux With a Twist
FredReynolds2
 
Secure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliverySecure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous delivery
Black Duck by Synopsys
 
Secure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliverySecure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous delivery
Tim Mackey
 

Similar to penetration test using Kali linux ppt (20)

IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET- Penetration Testing using Metasploit Framework: An Ethical ApproachIRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
 
A Comparison Study of Open Source Penetration Testing Tools
A Comparison Study of Open Source Penetration Testing ToolsA Comparison Study of Open Source Penetration Testing Tools
A Comparison Study of Open Source Penetration Testing Tools
 
Metaploit
MetaploitMetaploit
Metaploit
 
kali linux.pptx
kali linux.pptxkali linux.pptx
kali linux.pptx
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
Eliz seminar
Eliz seminar Eliz seminar
Eliz seminar
 
Finalppt metasploit
Finalppt metasploitFinalppt metasploit
Finalppt metasploit
 
Software Security Assurance for DevOps
Software Security Assurance for DevOpsSoftware Security Assurance for DevOps
Software Security Assurance for DevOps
 
Penetration testing tools and phases
Penetration testing tools and phasesPenetration testing tools and phases
Penetration testing tools and phases
 
Cybersecurity Free Tools for Practice Project.pdf
Cybersecurity Free Tools for Practice Project.pdfCybersecurity Free Tools for Practice Project.pdf
Cybersecurity Free Tools for Practice Project.pdf
 
(03 2013) guide to kali linux
(03 2013)   guide to kali linux(03 2013)   guide to kali linux
(03 2013) guide to kali linux
 
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
 
A Comparative Study between Vulnerability Assessment and Penetration Testing
A Comparative Study between Vulnerability Assessment and Penetration TestingA Comparative Study between Vulnerability Assessment and Penetration Testing
A Comparative Study between Vulnerability Assessment and Penetration Testing
 
Final project.ppt
Final project.pptFinal project.ppt
Final project.ppt
 
kali linux.pptx
kali linux.pptxkali linux.pptx
kali linux.pptx
 
Exploits Attack on Windows Vulnerabilities
Exploits Attack on Windows VulnerabilitiesExploits Attack on Windows Vulnerabilities
Exploits Attack on Windows Vulnerabilities
 
Linux/Unix Night - (PEN) Testing Toolkits (English)
Linux/Unix Night - (PEN) Testing Toolkits (English)Linux/Unix Night - (PEN) Testing Toolkits (English)
Linux/Unix Night - (PEN) Testing Toolkits (English)
 
Unleash the Power: How to Install Kali Linux With a Twist
Unleash the Power: How to Install Kali Linux With a TwistUnleash the Power: How to Install Kali Linux With a Twist
Unleash the Power: How to Install Kali Linux With a Twist
 
Secure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliverySecure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous delivery
 
Secure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliverySecure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous delivery
 

Recently uploaded

Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
manasideore6
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
aqil azizi
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
anoopmanoharan2
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABSDESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
itech2017
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
ChristineTorrepenida1
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
ssuser7dcef0
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
The Role of Electrical and Electronics Engineers in IOT Technology.pdf
The Role of Electrical and Electronics Engineers in IOT Technology.pdfThe Role of Electrical and Electronics Engineers in IOT Technology.pdf
The Role of Electrical and Electronics Engineers in IOT Technology.pdf
Nettur Technical Training Foundation
 
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSCW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
veerababupersonal22
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 

Recently uploaded (20)

Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABSDESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
The Role of Electrical and Electronics Engineers in IOT Technology.pdf
The Role of Electrical and Electronics Engineers in IOT Technology.pdfThe Role of Electrical and Electronics Engineers in IOT Technology.pdf
The Role of Electrical and Electronics Engineers in IOT Technology.pdf
 
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSCW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 

penetration test using Kali linux ppt

  • 1. Seminar On Penetration Test Using Kali Linux Submitted by NAME : NAIK ABHAY SURESH USN: 2JI15CS025 Guided by: Dr. Dinesha. H. A
  • 2. CONTENTS 1. Introduction To Kali Linux 2. Introduction To Penetration Test 3. Literature Survey 4. Methodology 5. Advantages 6. Applications 7. Conclusion 8. References
  • 3. Introduction  Kali Linux is a Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing services.  Kali is packed with the tools which helps in achieving goals towards various information security tasks, such as Penetration Testing, Security research, Computer Forensics and Reverse Engineering etc.
  • 4. Introduction to Penetration  Penetration Testing is the process of simulating attacks (on purpose) on the system that needs to be flawed-free (i.e., there should not be any holes) in order to stop a hacker or attacker to follow out an attack along the organization.  It deals with most of common things that usually a developer forgets to cover during the development process. But, by the magic of Penetration Testing it is possible to remove such kind of holes in the application or in any system.
  • 5. Literature Survey  Devanshu Bhatt in his work on Modern Day Penetration Testing Distribution Open Source Platform Kali Linux, concluded that By utilizing Kali Linux–Open source Distribution Framework and number of applications it supports like Dmitry and Metasploit, he’s been able to get access on the target Debian Linux machine. Kali Linux's Dmitry and Metasploit Framework offers significant variety of exploits with the collection of all operating system with available versions and service packs.
  • 6. METHODOLOGY  Basically, the overall process of penetration testing can be carved up into a no. of steps that make an inclusive methodology of penetration testing The phases of penetration testing are as follows:  Information Gathering  Scanning  Exploitation  Post Exploitation & Maintaining Access
  • 7. Information Gathering  This phase needs patience and lots of time, this phase generates a massive amount of information about the target. The main motto of Information Gathering is to collect as much information as possible on the target. Kali Linux provides a variety of tools for gathering information about the target. Scanning  This stage is the most important phase where the pen-tester needs to identify the exposures of the target. This can be also referred to as “Vulnerability Assessment”. The pen-tester uses different tools and utilities to reveal the holes in the services, ports and applications running on the host. Some kali linux tools for Scanning are Webshag and Vega
  • 8. Exploitation  This process is nothing but the Exploitation process. In simple words gaining access to the target using its vulnerabilities. Exploitation delivers the payloads on the target in order to forcefully grant the access into the target. There are different types of exploits available over the Internet, but the widely used is the “Metasploit Project”. Post Exploitation  This phase plays a crucial role in the penetration testing process. Maintaining access to the target after the exploitation is a very serious activity and needs to done carefully. in order to achieve this “backdoors” are required to be created and needs to be loaded on the target. Backdoors are nothing but a piece of software that allows the unauthorized user to get into the target at any time.
  • 9. Why use Kali?  It is FREE!!!!!  300+ applications, from password crackers to digital forensics software.  Vast wireless device support (ARM processors).  Completely Customizable.  Multilingual Support.  Secure Development Environment.  Open source Git tree.  Filesystem Hierarchy Standard (FHS) Compliant.
  • 10. Application Menu  Information Gathering  Vulnerability Analysis  Web Application Analysis  Database Assessment  Password Attacks  Wireless Attacks  Forensics  Etc.
  • 11.
  • 12. CONCLUSION  Kali Linux is proved to be very useful and completely free Operating System that can be used for the penetration testing.  Penetration testing requires lots of time and patience to get the results and to get them repaired. The Kali is a tool for the Linux users to provide them numerous tricks in the security department.  Kali is packed with the tools which helps in achieving goals towards various information security tasks, such as Penetration Testing.
  • 13. References  Devanshu Bhatt’s paper on Modern Day Penetration Testing Distribution Open Source Platform -Kali Linux. International journal of scientific & technology research volume 7, issue 4 , April 2018.  Gurdeep Singh and Jaswinder Singh’s paper on Evaluation of Penetration Testing Tools of KALI LINUX. International Journal of Innovations & Advancement in Computer Science IJIACS ISSN 2347 – 8616 Volume 5, Issue 9, September 2016.  Matthew Denis, Carlos Zena and Thaier Hayajneh’s paper on Penetration Testing: Attack Methods, and Defence Strategies. IEEE paper, 29 April 2016.  Suraj S. Mundalik’s paper on Penetration Testing: An Art of Securing the System (Using Kali Linux). International Journal of Advanced Research in Computer Science and Software Engineering Volume 5, Issue 10, October-2016.  Kali Linux Revealed “Mastering the Penetration Testing Distribution” text book by Raphaël Hertzog, Jim O’Gorman and Mati Aharoni 2017.