SlideShare una empresa de Scribd logo
1 de 22
OPERATING SYSTEM
2016
KALI LINIUX OPERATING
SYSTEM
Operating system
Submitby: Sir Shahzad Jaffar
S I R S H A H Z A D J A F F A R
OPERATING SYSTEM
Topic
Kali Limoux Operating System
Class:
MITM-Part (2)
SUBITTED BY:
ISMAT SHAKOOR
SUBJECT:
Operating System
Submitted To:
SIR: Shahzad Jaffar
OPERATING SYSTEM
TABLE OF CONTENT page No
1. Acknowledgement 05
2. Introducation of kali Linux 06
2.0More than 600 penetration testing tools included 06
2.1Free (as in beer) and always will be 06
2.2Open source Git tree 06
2.3FHS compliant 06
2.4Wide-ranging wireless device support 06
2.5Wide-ranging wireless device support 06
2.6Custom kernel, patched for injection 06
2.7Developed in a secure environment 06.
2.8GPG signed packages and repositories 06
2.9Multi-language support 07
2.10Completely customizable 07
2.11ARMEL and ARMHF support 07
3.History of kali Linux 07
3.0What is the history of Kali Linux and Backtrack? 07
3.1So why bother changing the name? 08
4.How to Install Kali Linux step-by-Step Guide 08_16
5.Understanding the directory structure of kali Linux 017
5.0Root 017
5.1bin user binaries 017
5.2sbin system binaries 017
5.3etc Configuration File 017
5.4dev device file 017
5.5process information 018
5.6Variable file 018
5.7Temporary file 018
5.8User program 018
5.9Home directories 018
5.10Boot loader file 019
5.11System libraries 019
5.12Optional add on application 019
5.13Mount directory 019
5.14Removable media device 019
OPERATING SYSTEM
5.15Service data 019
6.Commands of kali Linux 20
7.conclution 21
Acknowledgment
OPERATING SYSTEM
Acknowledgment "We have taken efforts in this project. This book would
have not been possible without the support and encouragement of our
Teacher. We are highly grateful to members of group for their guidance
and constant supervision as well as for providing necessary information
regarding the project & also for their support in completing the project.
If you would ever like any more information from us, please feel free to
call me or any member of my staff directly. Enclosed you will find
information cards should you know of anyone who may benefit from our
services of server room. I would like to say thanks to my friends for
helping me along with the production of this book. My thanks and
appreciations also go to my colleague in developing the project and
people who have willingly helped me out with their abilities." I would
like to take this opportunity to my teacher Prof. Shahzad jaffar whose
guidance and encouragement has enabled me to complete this project. I
learnt a lot of things from this project.
OPERATING SYSTEM
Kali Linux is a Debian-based Linux distribution aimed at advanced Penetration Testing
and Security Auditing. Kali contains several hundred tools aimed at various information
security tasks, such as Penetration Testing, Forensics and Reverse Engineering. Kali
Linux is developed, funded and maintained by offensive security , a leading information
security training company.
Kali Linux was released on the 13th March, 2013 as a complete, top-to-bottom rebuild
of back track security adhering completely to debain development standards.
 More than 600 penetration testing tools included: After reviewing every
tool that was included in BackTrack, we eliminated a great number of tools that
either simply did not work or which duplicated other tools that provided the same or
similar functionality. Details on what’s included are on the kali toolssite.
 Free (as in beer) and always will be: Kali Linux, like BackTrack, is
completely free of charge and always will be. You will never, ever have to pay for
Kali Linux.
 Open source Git tree: We are committed to the open source development
model and our development tree is available for all to see. All of the
source code which goes into Kali Linux is available for anyone who wants to tweak
or rebuild packages to suit their specific needs.
 FHS compliant: Kali adheres to the File System Hierarchy Standard, allowing
Linux users to easily locate binaries, support files, libraries, etc.
 Wide-ranging wireless device support: A regular sticking point with Linux
distributions has been supported for wireless interfaces. We have built Kali Linux to
support as many wireless devices as we possibly can, allowing it to run properly on
a wide variety of hardware and making it compatible with numerous USB and other
wireless devices.
 Custom kernel, patched for injection: As penetration testers, the
development team often needs to do wireless assessments, so our kernel has the
latest injection patches included.
 Developed in a secure environment: The Kali Linux team is made up of a
small group of individuals who are the only ones trusted to commit packages and
interact with the repositories, all of which is done using multiple secure protocols.
OPERATING SYSTEM
 GPG signed packages and repositories: Every package in Kali Linux
is signed by each individual developer who built and committed it, and the
repositories subsequently sign the packages as well.
 Multi-language support: Although penetration tools tend to be written in
English, we have ensured that Kali includes true multilingual support, allowing more
users to operate in their native language and locate the tools they need for the job.
 Completely customizable: We thoroughly understand that not everyone will
agree with our design decisions, so we have made it as easy as possible for our
more adventurous users to customize kali Linux to their liking, all the way down to
the kernel.
 ARMEL and ARMHF support: Since ARM-based single-board systems like
the Raspberry Pi and BeagleBone Black, among others, are becoming more and
more prevalent and inexpensive, we knew that kali’s ARM support would need to be
as robust as we could manage, with fully working installations for both ARMEL and
ARMHF systems..
 History ofkali Linux
Looks like Kali Linux is a great success. Kali Linux is the successor to BackTrack, the
much loved Linux Penetration Distro/ Operating System that is aimed at penetration
testers and security professionals. Before we dive into our brief review – we thought it
would be cool to give a brief history of how Kali Linux came to be.
 What is the historyof Kali Linuxand Backtrack?
We are all very familiar with Backtrack, which has been around for the last seven
years – created and managed by Offensive Security, but what is the history of this
famous Linux penetration testing distribution?
Much like we trace our ancestors back to Africa, so we trace Kali Linux back to Knoppix!
Knoppix was (I think) one of the first ever bootable Live Linux Distro’s. Still in existence,
Knoppix is a classic distro with a loyal community. Over time the Knoppix project was
forked into WHoppix (yes the WH are meant to be capitalized) that was then re-forked
into WHAX. WHAX was then re-branded and streamlined into the BackTrack that we all
used. There is a common thread throughout these distros, (Knoppix, which became
WHoppix, and then WHAX and finally into BackTrack); that is that the lineage focused
on intrusion detection and digital forensics. BackTrack expanded the scope and allowed
for many more tools to be incorporated into the distro. In any event, BackTrack had a
long reign of almost seven years as the pentesters and hackers distro of choice.
However, as of March 2013 the venerated distro was decommissioned and replaced by
Kali Linux. Phew. Long story – but the bottom line is that Kali Linux is the result of a rich
and colorful history.
OPERATING SYSTEM
 So why bother changing the name?
Kali Linux is so different that the fine folks over at Offensive Security thought that to
solve the ‘inherent problems’ of BackTrack the authors needed a complete re-write.
The main issue with BackTrack v1-v5 was that it was a headache for dependencies.
Here was the problem: too many pentesting tools embedded within BackTrack all
struggled to co-exist within the dependencies. Many pentesting and security tools
where not regularly updated by their creators so the result was that trying to update
the entire OS often caused conflicts and tools would simply stop working, crash or
even cause other tools to crash. A good example of this is Ettercap which was not
updated for a long time.
The solution was to rebuild the distro bottom-up by making Kali Debian based. Before
with BackTrack there was a /pentest/ folder, whereas now it is all updated and managed
by Debian packages.
Kali Linux has 300 tools which automatically work within the Kali ecosphere. Kali also
has been created with the clean “File system Hierarchy Standard” and offers vast plug
and play wireless support, with the only exception appearing to be broadcom.
 How to Install Kali Linux 2.0 Sana in VMware Workstation Step-
by-Step Guide
OPERATING SYSTEM
OPERATING SYSTEM
OPERATING SYSTEM
OPERATING SYSTEM
OPERATING SYSTEM
OPERATING SYSTEM
OPERATING SYSTEM
OPERATING SYSTEM
OPERATING SYSTEM
1. / – Root
 Every single file and directory starts from the root directory.
 Only root user has write privilege under this directory.
 Please note that /root is root user’s home directory, which is not same as /.
2. /bin – User Binaries
 Contains binary executables.
 Common Linux commands you need to use in single-user modes are located
under this directory.
 Commands used by all the users of the system are located here.
 For example: ps, ls, ping, grep, cp.
3. /sbin – System Binaries
 Just like /bin, /sbin also contains binary executables.
 But, the linux commands located under this directory are used typically by
system aministrator, for system maintenance purpose.
 For example: iptables, reboot, fdisk, ifconfig, swapon
4. /etc – ConfigurationFiles
 Contains configuration files required by all programs.
 This also contains startup and shutdown shell scripts used to start/stop individual
programs.
 For example: /etc/resolv.conf, /etc/logrotate.conf
5. /dev – DeviceFiles
 Contains device files.
 These include terminal devices, usb, or any device attached to the system.
 For example: /dev/tty1, /dev/usbmon0
OPERATING SYSTEM
6. /proc – Process Information
 Contains information about system process.
 This is a pseudo filesystem contains information about running process. For
example: /proc/{pid} directory contains information about the process with that
particular pid.
 This is a virtual filesystem with text information about system resources. For
example: /proc/uptime
7. /var – Variable Files
 var stands for variable files.
 Content of the files that are expected to grow can be found under this directory.
 This includes — system log files (/var/log); packages and database files (/var/lib);
emails (/var/mail); print queues (/var/spool); lock files (/var/lock); temp files
needed across reboots (/var/tmp);
8. /tmp – Temporary Files
 Directory that contains temporary files created by system and users.
 Files under this directory are deleted when system is rebooted.
9. /usr – User Programs
 Contains binaries, libraries, documentation, and source-code for second level
programs.
 /usr/bin contains binary files for user programs. If you can’t find a user binary
under /bin, look under /usr/bin. For example: at, awk, cc, less, scp
 /usr/sbin contains binary files for system administrators. If you can’t find a system
binary under /sbin, look under /usr/sbin. For example: atd, cron, sshd, useradd,
userdel
 /user/lib contains libraries for /usr/bin and /usr/sbin
 /user/local contains users programs that you install from source. For example,
when you install apache from source, it goes under /usr/local/apache2
10. /home – Home Directories
 Home directories for all users to store their personal files.
 For example: /home/john, /home/nikita
11. /boot – Boot Loader Files
 Contains boot loader related files.
 Kernel initrd, vmlinux, grub files are located under /boot
 For example: initrd.img-2.6.32-24-generic, vmlinuz-2.6.32-24-generic
OPERATING SYSTEM
12. /lib – System Libraries
 Contains library files that supports the binaries located under /bin and /sbin
 Library filenames are either ld* or lib*.so.*
 For example: ld-2.11.1.so, libncurses.so.5.7
13. /opt – Optionaladd-onApplications
 opt stands for optional.
 Contains add-on applications from individual vendors.
 add-on applications should be installed under either /opt/ or /opt/ sub-directory.
14. /mnt – MountDirectory
 Temporary mount directory where sysadminscan mountfilesystems.
15. /media – Removable Media Devices
 Temporary mount directory for removable devices.
 For examples, /media/cdrom for CD-ROM; /media/floppy for floppy drives;
/media/cdrecorder for CD writer
16. /srv – Service Data
 srv stands for service.
 Contains server specific services related data.
 For example, /srv/cvs contains CVS related data.
OPERATING SYSTEM
Kali Linux Commands
Commands Function
aspell Spell Checker
Bg Send to background
break Exit from a loop
Builtin Run a shell builtin
cal Display a calendar
cd
Change
Directory
chown Change file owner and group
cp Copy one or more files to another location
date Display or change the date and time
dc Desk Calculator
diff Display the differences between two files
dircolors Colour setup for `ls’
exit Exit the shell
false Do nothing, unsuccessfully
format Format disks or tapes
groupdel Delete a group
history Command History
jobs List active jobs
man Help manual
times User and system times
write Send a message to another user
rename Rename files
rm Remove files
OPERATING SYSTEM
Conclusion
In this paper we have presented the Adaptive Domain Environment for Operating
Systems as a solution for sharing hardware resources amongst multiple operating
systems. We have presented its architecture and suggested an implementation method
for the ix86 using Linux as the base OS. We have also defined areas of applicability.
Although the implementation discussion has centered around on the ix86 using Linux,
the concepts presented may be extended to other architectures and other base
operating systems in order to provide the same capabilities.
Given the current state of the operating system market and the research field, Adios
may be used to provide a bridge between both fields and promote the development of
more flexible and cooperative operating systems. This would provide system
administrators and programmers with the flexibility needed to develop user-friendly
operating environments and applications that are not limited by the choice of a single
operating system.
OPERATING SYSTEM
References:
 https://www.kali.org/
 https://en.wikipedia.org/wiki/Kali_Linux
 www.kalitut.com › Linux Commands
 https://www.kali.org/news/birth-of-kali/
 https://www.blackmoreops.com/2015/02/14/linux-file-system-
hierarchy/
 superuser.com/questions/752551/kali-where-do-installed-
programs-go
 https://www.offensive-security.com/metasploit.../modules-and-
locations/

Más contenido relacionado

La actualidad más candente

(03 2013) guide to kali linux
(03 2013)   guide to kali linux(03 2013)   guide to kali linux
(03 2013) guide to kali linuxjulius77
 
Linux/Unix Night - (PEN) Testing Toolkits (English)
Linux/Unix Night - (PEN) Testing Toolkits (English)Linux/Unix Night - (PEN) Testing Toolkits (English)
Linux/Unix Night - (PEN) Testing Toolkits (English)Jelmer de Reus
 
Shamsa altayer 10bg kali linux
Shamsa altayer 10bg   kali linuxShamsa altayer 10bg   kali linux
Shamsa altayer 10bg kali linuxshamsaot
 
BASIC OVERVIEW OF KALI LINUX
BASIC OVERVIEW OF KALI LINUXBASIC OVERVIEW OF KALI LINUX
BASIC OVERVIEW OF KALI LINUXDeborah Akuoko
 
Securing your Container Environment with Open Source
Securing your Container Environment with Open SourceSecuring your Container Environment with Open Source
Securing your Container Environment with Open SourceMichael Ducy
 
Veer's Container Security
Veer's Container SecurityVeer's Container Security
Veer's Container SecurityJim Barlow
 
Software update for embedded systems
Software update for embedded systemsSoftware update for embedded systems
Software update for embedded systemsSZ Lin
 
5 Ways to Secure Your Containers for Docker and Beyond
5 Ways to Secure Your Containers for Docker and Beyond5 Ways to Secure Your Containers for Docker and Beyond
5 Ways to Secure Your Containers for Docker and BeyondBlack Duck by Synopsys
 
Linux Interview Questions And Answers | Linux Administration Tutorial | Linux...
Linux Interview Questions And Answers | Linux Administration Tutorial | Linux...Linux Interview Questions And Answers | Linux Administration Tutorial | Linux...
Linux Interview Questions And Answers | Linux Administration Tutorial | Linux...Edureka!
 
How Secure Is Your Container? ContainerCon Berlin 2016
How Secure Is Your Container? ContainerCon Berlin 2016How Secure Is Your Container? ContainerCon Berlin 2016
How Secure Is Your Container? ContainerCon Berlin 2016Phil Estes
 

La actualidad más candente (20)

(03 2013) guide to kali linux
(03 2013)   guide to kali linux(03 2013)   guide to kali linux
(03 2013) guide to kali linux
 
Linux/Unix Night - (PEN) Testing Toolkits (English)
Linux/Unix Night - (PEN) Testing Toolkits (English)Linux/Unix Night - (PEN) Testing Toolkits (English)
Linux/Unix Night - (PEN) Testing Toolkits (English)
 
Shamsa altayer 10bg kali linux
Shamsa altayer 10bg   kali linuxShamsa altayer 10bg   kali linux
Shamsa altayer 10bg kali linux
 
Kali linux tutorial
Kali linux tutorialKali linux tutorial
Kali linux tutorial
 
Kali Linux
Kali LinuxKali Linux
Kali Linux
 
Tools kali
Tools kaliTools kali
Tools kali
 
Kalilinux
KalilinuxKalilinux
Kalilinux
 
Kali linux
Kali linuxKali linux
Kali linux
 
kali linux.pptx
kali linux.pptxkali linux.pptx
kali linux.pptx
 
Kalilinux
KalilinuxKalilinux
Kalilinux
 
BASIC OVERVIEW OF KALI LINUX
BASIC OVERVIEW OF KALI LINUXBASIC OVERVIEW OF KALI LINUX
BASIC OVERVIEW OF KALI LINUX
 
Kali linux
Kali linuxKali linux
Kali linux
 
Securing your Container Environment with Open Source
Securing your Container Environment with Open SourceSecuring your Container Environment with Open Source
Securing your Container Environment with Open Source
 
Veer's Container Security
Veer's Container SecurityVeer's Container Security
Veer's Container Security
 
Software update for embedded systems
Software update for embedded systemsSoftware update for embedded systems
Software update for embedded systems
 
5 Ways to Secure Your Containers for Docker and Beyond
5 Ways to Secure Your Containers for Docker and Beyond5 Ways to Secure Your Containers for Docker and Beyond
5 Ways to Secure Your Containers for Docker and Beyond
 
Docker & Daily DevOps
Docker & Daily DevOpsDocker & Daily DevOps
Docker & Daily DevOps
 
Linux Interview Questions And Answers | Linux Administration Tutorial | Linux...
Linux Interview Questions And Answers | Linux Administration Tutorial | Linux...Linux Interview Questions And Answers | Linux Administration Tutorial | Linux...
Linux Interview Questions And Answers | Linux Administration Tutorial | Linux...
 
How Secure Is Your Container? ContainerCon Berlin 2016
How Secure Is Your Container? ContainerCon Berlin 2016How Secure Is Your Container? ContainerCon Berlin 2016
How Secure Is Your Container? ContainerCon Berlin 2016
 
Kali presentation
Kali presentationKali presentation
Kali presentation
 

Destacado

Resarch Project Burkina Faso country report Alanood Alotaibi
Resarch Project Burkina Faso country report Alanood AlotaibiResarch Project Burkina Faso country report Alanood Alotaibi
Resarch Project Burkina Faso country report Alanood AlotaibiAlanood Alotaibi
 

Destacado (7)

Kali Linux
Kali LinuxKali Linux
Kali Linux
 
Kali linux
Kali linuxKali linux
Kali linux
 
Kali Linux Installation - VMware
Kali Linux Installation - VMwareKali Linux Installation - VMware
Kali Linux Installation - VMware
 
Adam-Resume1
Adam-Resume1Adam-Resume1
Adam-Resume1
 
GivingBlackBoston
GivingBlackBostonGivingBlackBoston
GivingBlackBoston
 
Resarch Project Burkina Faso country report Alanood Alotaibi
Resarch Project Burkina Faso country report Alanood AlotaibiResarch Project Burkina Faso country report Alanood Alotaibi
Resarch Project Burkina Faso country report Alanood Alotaibi
 
La certification des arbitres
La certification des arbitresLa certification des arbitres
La certification des arbitres
 

Similar a Operating project

Unleash the Power: How to Install Kali Linux With a Twist
Unleash the Power: How to Install Kali Linux With a TwistUnleash the Power: How to Install Kali Linux With a Twist
Unleash the Power: How to Install Kali Linux With a TwistFredReynolds2
 
Slide sistem operasi
Slide sistem operasiSlide sistem operasi
Slide sistem operasitheogrouptech
 
Kali Linux-Operating System Presentation.pptx
Kali Linux-Operating System Presentation.pptxKali Linux-Operating System Presentation.pptx
Kali Linux-Operating System Presentation.pptxSumaiyaSinja1
 
Hackers OS Kali Linux for Penetration Testing - By Cyber Expert Amish Patel -...
Hackers OS Kali Linux for Penetration Testing - By Cyber Expert Amish Patel -...Hackers OS Kali Linux for Penetration Testing - By Cyber Expert Amish Patel -...
Hackers OS Kali Linux for Penetration Testing - By Cyber Expert Amish Patel -...Amish Patel
 
Kali linux
Kali linux Kali linux
Kali linux Fa6ma_
 
technical-presentation-kali-linux.pptx
technical-presentation-kali-linux.pptxtechnical-presentation-kali-linux.pptx
technical-presentation-kali-linux.pptxjayanthansabalingam
 
technical-presentation-kali-linux.pptx hakkında
technical-presentation-kali-linux.pptx hakkındatechnical-presentation-kali-linux.pptx hakkında
technical-presentation-kali-linux.pptx hakkındaNuhAzgnolu1
 
Parrot Security OS | Introduction to Parrot Security OS | Cybersecurity Train...
Parrot Security OS | Introduction to Parrot Security OS | Cybersecurity Train...Parrot Security OS | Introduction to Parrot Security OS | Cybersecurity Train...
Parrot Security OS | Introduction to Parrot Security OS | Cybersecurity Train...Edureka!
 

Similar a Operating project (20)

Operating system
Operating systemOperating system
Operating system
 
Unleash the Power: How to Install Kali Linux With a Twist
Unleash the Power: How to Install Kali Linux With a TwistUnleash the Power: How to Install Kali Linux With a Twist
Unleash the Power: How to Install Kali Linux With a Twist
 
kali linux.pptx
kali linux.pptxkali linux.pptx
kali linux.pptx
 
Sistem operasi
Sistem operasiSistem operasi
Sistem operasi
 
Slide sistem operasi
Slide sistem operasiSlide sistem operasi
Slide sistem operasi
 
Kal i linux
Kal i linuxKal i linux
Kal i linux
 
Kali Linux-Operating System Presentation.pptx
Kali Linux-Operating System Presentation.pptxKali Linux-Operating System Presentation.pptx
Kali Linux-Operating System Presentation.pptx
 
Kali linux
Kali linuxKali linux
Kali linux
 
kali linux.pptx
kali linux.pptxkali linux.pptx
kali linux.pptx
 
Kali kinux1
Kali kinux1Kali kinux1
Kali kinux1
 
kali linix
kali linixkali linix
kali linix
 
Kali linux.ppt
Kali linux.pptKali linux.ppt
Kali linux.ppt
 
Hackers OS Kali Linux for Penetration Testing - By Cyber Expert Amish Patel -...
Hackers OS Kali Linux for Penetration Testing - By Cyber Expert Amish Patel -...Hackers OS Kali Linux for Penetration Testing - By Cyber Expert Amish Patel -...
Hackers OS Kali Linux for Penetration Testing - By Cyber Expert Amish Patel -...
 
Kali Linux
Kali LinuxKali Linux
Kali Linux
 
Linux
Linux Linux
Linux
 
Kali linux
Kali linux Kali linux
Kali linux
 
technical-presentation-kali-linux.pptx
technical-presentation-kali-linux.pptxtechnical-presentation-kali-linux.pptx
technical-presentation-kali-linux.pptx
 
technical-presentation-kali-linux.pptx hakkında
technical-presentation-kali-linux.pptx hakkındatechnical-presentation-kali-linux.pptx hakkında
technical-presentation-kali-linux.pptx hakkında
 
Kali linux 2021.2
Kali linux 2021.2Kali linux 2021.2
Kali linux 2021.2
 
Parrot Security OS | Introduction to Parrot Security OS | Cybersecurity Train...
Parrot Security OS | Introduction to Parrot Security OS | Cybersecurity Train...Parrot Security OS | Introduction to Parrot Security OS | Cybersecurity Train...
Parrot Security OS | Introduction to Parrot Security OS | Cybersecurity Train...
 

Último

Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...tanu pandey
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...singhpriety023
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceDelhi Call girls
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrHenryBriggs2
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445ruhi
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLimonikaupta
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubaikojalkojal131
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftAanSulistiyo
 
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...nirzagarg
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdfMatthew Sinclair
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...SUHANI PANDEY
 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...SUHANI PANDEY
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...tanu pandey
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋nirzagarg
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdfMatthew Sinclair
 
Wadgaon Sheri $ Call Girls Pune 10k @ I'm VIP Independent Escorts Girls 80057...
Wadgaon Sheri $ Call Girls Pune 10k @ I'm VIP Independent Escorts Girls 80057...Wadgaon Sheri $ Call Girls Pune 10k @ I'm VIP Independent Escorts Girls 80057...
Wadgaon Sheri $ Call Girls Pune 10k @ I'm VIP Independent Escorts Girls 80057...SUHANI PANDEY
 

Último (20)

Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
Wadgaon Sheri $ Call Girls Pune 10k @ I'm VIP Independent Escorts Girls 80057...
Wadgaon Sheri $ Call Girls Pune 10k @ I'm VIP Independent Escorts Girls 80057...Wadgaon Sheri $ Call Girls Pune 10k @ I'm VIP Independent Escorts Girls 80057...
Wadgaon Sheri $ Call Girls Pune 10k @ I'm VIP Independent Escorts Girls 80057...
 

Operating project

  • 1. OPERATING SYSTEM 2016 KALI LINIUX OPERATING SYSTEM Operating system Submitby: Sir Shahzad Jaffar S I R S H A H Z A D J A F F A R
  • 2. OPERATING SYSTEM Topic Kali Limoux Operating System Class: MITM-Part (2) SUBITTED BY: ISMAT SHAKOOR SUBJECT: Operating System Submitted To: SIR: Shahzad Jaffar
  • 3. OPERATING SYSTEM TABLE OF CONTENT page No 1. Acknowledgement 05 2. Introducation of kali Linux 06 2.0More than 600 penetration testing tools included 06 2.1Free (as in beer) and always will be 06 2.2Open source Git tree 06 2.3FHS compliant 06 2.4Wide-ranging wireless device support 06 2.5Wide-ranging wireless device support 06 2.6Custom kernel, patched for injection 06 2.7Developed in a secure environment 06. 2.8GPG signed packages and repositories 06 2.9Multi-language support 07 2.10Completely customizable 07 2.11ARMEL and ARMHF support 07 3.History of kali Linux 07 3.0What is the history of Kali Linux and Backtrack? 07 3.1So why bother changing the name? 08 4.How to Install Kali Linux step-by-Step Guide 08_16 5.Understanding the directory structure of kali Linux 017 5.0Root 017 5.1bin user binaries 017 5.2sbin system binaries 017 5.3etc Configuration File 017 5.4dev device file 017 5.5process information 018 5.6Variable file 018 5.7Temporary file 018 5.8User program 018 5.9Home directories 018 5.10Boot loader file 019 5.11System libraries 019 5.12Optional add on application 019 5.13Mount directory 019 5.14Removable media device 019
  • 4. OPERATING SYSTEM 5.15Service data 019 6.Commands of kali Linux 20 7.conclution 21 Acknowledgment
  • 5. OPERATING SYSTEM Acknowledgment "We have taken efforts in this project. This book would have not been possible without the support and encouragement of our Teacher. We are highly grateful to members of group for their guidance and constant supervision as well as for providing necessary information regarding the project & also for their support in completing the project. If you would ever like any more information from us, please feel free to call me or any member of my staff directly. Enclosed you will find information cards should you know of anyone who may benefit from our services of server room. I would like to say thanks to my friends for helping me along with the production of this book. My thanks and appreciations also go to my colleague in developing the project and people who have willingly helped me out with their abilities." I would like to take this opportunity to my teacher Prof. Shahzad jaffar whose guidance and encouragement has enabled me to complete this project. I learnt a lot of things from this project.
  • 6. OPERATING SYSTEM Kali Linux is a Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. Kali contains several hundred tools aimed at various information security tasks, such as Penetration Testing, Forensics and Reverse Engineering. Kali Linux is developed, funded and maintained by offensive security , a leading information security training company. Kali Linux was released on the 13th March, 2013 as a complete, top-to-bottom rebuild of back track security adhering completely to debain development standards.  More than 600 penetration testing tools included: After reviewing every tool that was included in BackTrack, we eliminated a great number of tools that either simply did not work or which duplicated other tools that provided the same or similar functionality. Details on what’s included are on the kali toolssite.  Free (as in beer) and always will be: Kali Linux, like BackTrack, is completely free of charge and always will be. You will never, ever have to pay for Kali Linux.  Open source Git tree: We are committed to the open source development model and our development tree is available for all to see. All of the source code which goes into Kali Linux is available for anyone who wants to tweak or rebuild packages to suit their specific needs.  FHS compliant: Kali adheres to the File System Hierarchy Standard, allowing Linux users to easily locate binaries, support files, libraries, etc.  Wide-ranging wireless device support: A regular sticking point with Linux distributions has been supported for wireless interfaces. We have built Kali Linux to support as many wireless devices as we possibly can, allowing it to run properly on a wide variety of hardware and making it compatible with numerous USB and other wireless devices.  Custom kernel, patched for injection: As penetration testers, the development team often needs to do wireless assessments, so our kernel has the latest injection patches included.  Developed in a secure environment: The Kali Linux team is made up of a small group of individuals who are the only ones trusted to commit packages and interact with the repositories, all of which is done using multiple secure protocols.
  • 7. OPERATING SYSTEM  GPG signed packages and repositories: Every package in Kali Linux is signed by each individual developer who built and committed it, and the repositories subsequently sign the packages as well.  Multi-language support: Although penetration tools tend to be written in English, we have ensured that Kali includes true multilingual support, allowing more users to operate in their native language and locate the tools they need for the job.  Completely customizable: We thoroughly understand that not everyone will agree with our design decisions, so we have made it as easy as possible for our more adventurous users to customize kali Linux to their liking, all the way down to the kernel.  ARMEL and ARMHF support: Since ARM-based single-board systems like the Raspberry Pi and BeagleBone Black, among others, are becoming more and more prevalent and inexpensive, we knew that kali’s ARM support would need to be as robust as we could manage, with fully working installations for both ARMEL and ARMHF systems..  History ofkali Linux Looks like Kali Linux is a great success. Kali Linux is the successor to BackTrack, the much loved Linux Penetration Distro/ Operating System that is aimed at penetration testers and security professionals. Before we dive into our brief review – we thought it would be cool to give a brief history of how Kali Linux came to be.  What is the historyof Kali Linuxand Backtrack? We are all very familiar with Backtrack, which has been around for the last seven years – created and managed by Offensive Security, but what is the history of this famous Linux penetration testing distribution? Much like we trace our ancestors back to Africa, so we trace Kali Linux back to Knoppix! Knoppix was (I think) one of the first ever bootable Live Linux Distro’s. Still in existence, Knoppix is a classic distro with a loyal community. Over time the Knoppix project was forked into WHoppix (yes the WH are meant to be capitalized) that was then re-forked into WHAX. WHAX was then re-branded and streamlined into the BackTrack that we all used. There is a common thread throughout these distros, (Knoppix, which became WHoppix, and then WHAX and finally into BackTrack); that is that the lineage focused on intrusion detection and digital forensics. BackTrack expanded the scope and allowed for many more tools to be incorporated into the distro. In any event, BackTrack had a long reign of almost seven years as the pentesters and hackers distro of choice. However, as of March 2013 the venerated distro was decommissioned and replaced by Kali Linux. Phew. Long story – but the bottom line is that Kali Linux is the result of a rich and colorful history.
  • 8. OPERATING SYSTEM  So why bother changing the name? Kali Linux is so different that the fine folks over at Offensive Security thought that to solve the ‘inherent problems’ of BackTrack the authors needed a complete re-write. The main issue with BackTrack v1-v5 was that it was a headache for dependencies. Here was the problem: too many pentesting tools embedded within BackTrack all struggled to co-exist within the dependencies. Many pentesting and security tools where not regularly updated by their creators so the result was that trying to update the entire OS often caused conflicts and tools would simply stop working, crash or even cause other tools to crash. A good example of this is Ettercap which was not updated for a long time. The solution was to rebuild the distro bottom-up by making Kali Debian based. Before with BackTrack there was a /pentest/ folder, whereas now it is all updated and managed by Debian packages. Kali Linux has 300 tools which automatically work within the Kali ecosphere. Kali also has been created with the clean “File system Hierarchy Standard” and offers vast plug and play wireless support, with the only exception appearing to be broadcom.  How to Install Kali Linux 2.0 Sana in VMware Workstation Step- by-Step Guide
  • 17. OPERATING SYSTEM 1. / – Root  Every single file and directory starts from the root directory.  Only root user has write privilege under this directory.  Please note that /root is root user’s home directory, which is not same as /. 2. /bin – User Binaries  Contains binary executables.  Common Linux commands you need to use in single-user modes are located under this directory.  Commands used by all the users of the system are located here.  For example: ps, ls, ping, grep, cp. 3. /sbin – System Binaries  Just like /bin, /sbin also contains binary executables.  But, the linux commands located under this directory are used typically by system aministrator, for system maintenance purpose.  For example: iptables, reboot, fdisk, ifconfig, swapon 4. /etc – ConfigurationFiles  Contains configuration files required by all programs.  This also contains startup and shutdown shell scripts used to start/stop individual programs.  For example: /etc/resolv.conf, /etc/logrotate.conf 5. /dev – DeviceFiles  Contains device files.  These include terminal devices, usb, or any device attached to the system.  For example: /dev/tty1, /dev/usbmon0
  • 18. OPERATING SYSTEM 6. /proc – Process Information  Contains information about system process.  This is a pseudo filesystem contains information about running process. For example: /proc/{pid} directory contains information about the process with that particular pid.  This is a virtual filesystem with text information about system resources. For example: /proc/uptime 7. /var – Variable Files  var stands for variable files.  Content of the files that are expected to grow can be found under this directory.  This includes — system log files (/var/log); packages and database files (/var/lib); emails (/var/mail); print queues (/var/spool); lock files (/var/lock); temp files needed across reboots (/var/tmp); 8. /tmp – Temporary Files  Directory that contains temporary files created by system and users.  Files under this directory are deleted when system is rebooted. 9. /usr – User Programs  Contains binaries, libraries, documentation, and source-code for second level programs.  /usr/bin contains binary files for user programs. If you can’t find a user binary under /bin, look under /usr/bin. For example: at, awk, cc, less, scp  /usr/sbin contains binary files for system administrators. If you can’t find a system binary under /sbin, look under /usr/sbin. For example: atd, cron, sshd, useradd, userdel  /user/lib contains libraries for /usr/bin and /usr/sbin  /user/local contains users programs that you install from source. For example, when you install apache from source, it goes under /usr/local/apache2 10. /home – Home Directories  Home directories for all users to store their personal files.  For example: /home/john, /home/nikita 11. /boot – Boot Loader Files  Contains boot loader related files.  Kernel initrd, vmlinux, grub files are located under /boot  For example: initrd.img-2.6.32-24-generic, vmlinuz-2.6.32-24-generic
  • 19. OPERATING SYSTEM 12. /lib – System Libraries  Contains library files that supports the binaries located under /bin and /sbin  Library filenames are either ld* or lib*.so.*  For example: ld-2.11.1.so, libncurses.so.5.7 13. /opt – Optionaladd-onApplications  opt stands for optional.  Contains add-on applications from individual vendors.  add-on applications should be installed under either /opt/ or /opt/ sub-directory. 14. /mnt – MountDirectory  Temporary mount directory where sysadminscan mountfilesystems. 15. /media – Removable Media Devices  Temporary mount directory for removable devices.  For examples, /media/cdrom for CD-ROM; /media/floppy for floppy drives; /media/cdrecorder for CD writer 16. /srv – Service Data  srv stands for service.  Contains server specific services related data.  For example, /srv/cvs contains CVS related data.
  • 20. OPERATING SYSTEM Kali Linux Commands Commands Function aspell Spell Checker Bg Send to background break Exit from a loop Builtin Run a shell builtin cal Display a calendar cd Change Directory chown Change file owner and group cp Copy one or more files to another location date Display or change the date and time dc Desk Calculator diff Display the differences between two files dircolors Colour setup for `ls’ exit Exit the shell false Do nothing, unsuccessfully format Format disks or tapes groupdel Delete a group history Command History jobs List active jobs man Help manual times User and system times write Send a message to another user rename Rename files rm Remove files
  • 21. OPERATING SYSTEM Conclusion In this paper we have presented the Adaptive Domain Environment for Operating Systems as a solution for sharing hardware resources amongst multiple operating systems. We have presented its architecture and suggested an implementation method for the ix86 using Linux as the base OS. We have also defined areas of applicability. Although the implementation discussion has centered around on the ix86 using Linux, the concepts presented may be extended to other architectures and other base operating systems in order to provide the same capabilities. Given the current state of the operating system market and the research field, Adios may be used to provide a bridge between both fields and promote the development of more flexible and cooperative operating systems. This would provide system administrators and programmers with the flexibility needed to develop user-friendly operating environments and applications that are not limited by the choice of a single operating system.
  • 22. OPERATING SYSTEM References:  https://www.kali.org/  https://en.wikipedia.org/wiki/Kali_Linux  www.kalitut.com › Linux Commands  https://www.kali.org/news/birth-of-kali/  https://www.blackmoreops.com/2015/02/14/linux-file-system- hierarchy/  superuser.com/questions/752551/kali-where-do-installed- programs-go  https://www.offensive-security.com/metasploit.../modules-and- locations/