1. Introduction to
Kali linux.
Abdullah Alshammari
Leader of CSC IAU
@ABDI_Alshammar
Montaha Alqudaihi
DSC Core member
@Montaha_d4
ِAhmed Alhassar
DSC Lead at IAU
@ahmed_alhassar
2. AGENDA
● What is Operating System?
● What is Kali Linux?
● Why Kali Linux?
● Kali Linux Users
● The Difference Between Kali Linux and Ubuntu
● Kali Linux Tools
4. Operating System
Operating System (OS) is a program that is
act an intermediary between a computer user
and computer hardware. An operating system
performs all the basic tasks like file
management, memory management, process
management, handling input and output, and
controlling peripheral devices such as disk drives
and printers.
6. What is Kali Linux ?
Kali Linux is an operating system Debian-derived Linux distribution
designed for digital forensics and penetration testing (ethical hacking). It is
maintained and funded by Offensive Security
8. Why Kali Linux
● Kali Linux is made with pentesters and pentesting in mind so,
expecting it to fit with your necessity might not be as simple even
though it’s completely possible.
● If you are new to Linux or have less experience with command line
you might find Kali Linux to be not so user-friendly, even though our
developers try to make it as user-friendly as possible some things
might be intimidating to you if you are new.
● If you are installing Kali Linux for the first time, it is recommended to
install first in Virtual Machine then, after getting familiar with it, you
can install it in your own hardware.
11. Features of kali Linux
• More than 600 penetration testing tools included.
• Free and always will be.
• Open source Git tree.
• Multi-language support.
• FHS compliant (Filesystem Hierarchy Standard).
• Available in a 32 bit and 64 bit.
• Available as an image for various ARM architectures. etc.
Raspberry pi.
• Users can customize Kali Linux to suit their needs
Filesystem Hierarchy Standard
12. Who Use Kali Linux
Ethical Hacker
Penetration Testing
Forensics
OTHER USERS
14. Ethical Hacker
Ethical hacker (also known as a white-hat hacker) is the ultimate
security professional. Ethical hackers know how to find and exploit
vulnerabilities and weaknesses in various systems—just like a
malicious hacker (or a black hat hacker). In fact, they both use the
same skills; however, an ethical hacker uses those skills in a legitimate,
lawful manner to try to find vulnerabilities and fix them before the bad
guys can get there and try to break in.
15. What is Penetration Testing?
Penetration testing, also called pen testing or ethical hacking, is the
practice of testing a computer system, network or web application to
find security vulnerabilities that an attacker could exploit.
Penetration testing can be automated with software applications or
performed manually.
16. Websites for Pen Testing
● https://bugbounty.sa/#/
● https://bugcrowd.com/programs
18. Forensics
is defined as the process of preservation,
identification, extraction, and documentation
of computer evidence which can be used by
the court of law. It is a science of finding
evidence from digital media like a
computer, mobile phone, server, or
network.
19. The Difference between Kali Linux and Ubuntu
Kali Linux Ubuntu
Primarily designed for purposes like
Penetration Testing and Digital Forensics
Designed to satisfy general Desktop and
Server requirements and also targeted in
some smart TV’s
Developed by Offensive Security. And
released on 13th March 2013.
Developed by Canonical. And released
back in 2004.
20. Useful tools in Kali Linux
- Nmap
- netdiscover
- Nikto
- Burpsuite
- hashcat
21. Terminal
Terminal, also known as command lines or consoles, allow
us to accomplish and automate tasks on a computer without
the use of a graphical user interface (GUI).
22. Basic Commands
Pwd: Prints the name of the present/current working directory.
Cd: It is used to change current working directory.
Ls: It is used to list the content of the directory
Cd - : To change back to the previous working directory
Mkdir: To create or make new directory.