Publicidad

Kali linux os

Student at Holy Mary Institute of Technology & Science
24 de Mar de 2018
Publicidad

Más contenido relacionado

Publicidad

Kali linux os

  1. KALI LINUX OS An open source penetration testing platform.
  2. WHAT IS KALI LINUX ? • Kali Linux is a Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. • It contains several hundred tools which are geared towards various information security tasks, such as Penetration Testing, Security research, Computer Forensics and Reverse Engineering. • Kali Linux is developed, funded and maintained by Offensive Security a leading information security training company.
  3. WHAT IS PENETRATION TESTING? • It is also termed as pen-testing, and is an authorized simulated attack on a computer system, performed to evaluate the security of the system. • This is done to identify both the weaknesses / vulnerabilities, including the potential of unauthorized parties to access to the systems features and data as well as strengths, enabling a full risk assessment to be completed.
  4. WHAT DOES KALI HAVE?? • More than 600 penetration testing tools • It is free and always will be • Open source Git tree (A Git is a distributed version control systems, it can be used as a server out of the box. Git refers to dictionaries as “ trees”.) • Kali adheres to the File System Hierarchy Standard, allowing Linux users to easily locate binaries, support files, libraries, etc. • Wide-ranging wireless device support. • Custom kernel, patched for injection. • Developed in a secure environment.
  5. • GPG signed packages and repositories which means every package in Kali Linux is signed by each individual developer who built and committed it, and the repositories subsequently sign the packages as well. • Multi-language support. • Completely customizable. • ARMEL and ARMHF support which means it is compatible with single board systems like Raspberry Pi, Beagle Bone Black. • A minimal and trusted set of repositories, the set of upstream software sources which Kali uses is kept to an absolute minimum. Many new Kali users are tempted to add additional repositories to their sources.list, but doing so runs a very serious risk of breaking your Kali Linux installation.
  6. SHOULD IT BE USED BY ALL?? • Kali was specifically designed for penetrating professionally through a system , hence ehy it is NOT recommended as a distributed system like linux and may not be as easy to use as linux which is a distributed sysytem.
  7. • NOTE: Kali is an open source but not a wide open source , it has a small and trusted team. • In addition, misuse of security and penetration testing tools within a network, particularly without specific authorization, may cause irreparable damage and result in significant consequences, personal and/or legal. “Not understanding what you were doing” is not going to work as an excuse.
  8. SYSTEM REQUIREMENTS • Kali has some minimum suggested specifications for hardware. Depending upon the intended use, more may be desired. This guide will be assuming that the reader will want to install Kali as the only operating system on the computer. • At least 10GB of disk space; strongly encouraged to have more • At least 512MB of RAM; more is encouraged especially for graphical environments • USB or CD/DVD boot support • Kali Linux ISO available from https://www.kali.org/downloads/
  9. FLEXIBILITY OF KALI LINUX • Kali Linux can run natively when installed on a computer’s hard disk or, • It can be booted from a live CD or a live USB or, it can be run on a virtual machine. • It can also be installed within a chroot environment on an android device.
  10. KALI LINUX LIVE USB INSTALL PROCEDURE • The specifics of this procedure will vary depending on whether you’re doing it on a Windows, Linux, or OS X system. • This guide will be assuming that a USB drive is available to use as the installation media. Take note that the USB drive should be as close to 4/8GB as possible and ALL DATA WILL BE REMOVED. •
  11. PROCEDURE TO CREATE A BOOTABLE PEN DRIVE AND INSTALL KALI.
  12. • After rebooting machine, you will be prompted with Kali Linux boot menu, from the list choose Kali GNU/Linux without recovery mode to boot normally to system.
  13. • After system booting, you will get the login screen for KALI Linux 1.1.0, use the default username as ‘root’ and password which you’ve set during the installation time at #step 10.
  14. We have successfully installed Kali Linux 1.1.0 and your system is ready to customize as per your requirements. Updating Kali Linux from Older Version to 1.1.0 : To upgrade Kali from older versions to newer 1.1.0, you can use the simple apt- get commands. We don’t have to download the ISO files and have a fresh new installation, just issue the following commands to upgrade the running system into newer version.
  15. PENETRATION-TESTING PROGRAMS• nmap – a port scanner. • Wireshark – a packet analyzer. • John The Ripper – a password cracker. • Aircrack-ng - a software suite for penetration testing wireless LAN’s. • iKat - a hacking tool • Hydra – Brute force password cracking tool. • Maltego - Information on visualization and relationship analysis tool. • Metasloit- framework for developing and executing exploits. • Owasp- Zap - Integrated pen-testing tool for web application. • Sqlmap – finds SQL injection flaws for taking over of database servers.
  16. Kali tool list – a cheat sheet
  17. Ubuntu • Ubuntu is a general desktop and server distribution. • Designed to satisfy general Desktop and Server requirements and also targeted in some Smart TV’s. • Developed by Canonical Ltd. and released back in 2004. Kali Linux • Kali Linux is a specialized distribution. • Primarily designed for purposes like penetration testing and digital forensics. • Developed by Offensive Security Ltd. and released on 13 th March 2013. • The latest version released is Kali 2.0
  18. Windows • Open source • Free software • Live CD distribution • Secure • No virus, Malware • Low hardware cost • Customizable and features. Kali • Closed source • Cost s around Rs. 7000 for only the non-pro OS • No CD and Usb distribution through common Cd’s. • Insecure to an extent • Can be effected by a virus and malware. • High hardware cost. • Not customizable.
  19. DEVELOPER’S POINT OF VIEW Mati Aharoni is the founder and core developer of kali Linux project, as well the CEO of Offensive Security. According to him- “It is critical to take the view of the attacker to see if your defenses are working.” This is the main idea behind the development of Kali Linux
  20. • ADVANTAGES: • The main advantage of kali is that it is helps us test penetration legally , giving us a benefit to find out loop holes which serve as open entry points to our system. • Basically helping us to be safe than sorry . • It is highly secure . • DISADVANTAGES: • The disadvantage of this system is that it does not function like a normal OS and cannot be used as one. • It gives a complete access an knowledge of penetration , that if not used wisely could have a near disastrous effect.
  21. THANK YOU A presentation by : Samantha Simran Lawrence 3rd year CSE, 15C91A0578
Publicidad