WHAT IS KALI LINUX ?
• Kali Linux is a Debian-based Linux distribution aimed at
advanced Penetration Testing and Security Auditing.
• It contains several hundred tools which are geared
towards various information security tasks, such as
Penetration Testing, Security research, Computer
Forensics and Reverse Engineering.
• Kali Linux is developed, funded and maintained
by Offensive Security a leading information security
WHAT IS PENETRATION
• It is also termed as pen-testing, and is an authorized
simulated attack on a computer system, performed to
evaluate the security of the system.
• This is done to identify both the weaknesses /
vulnerabilities, including the potential of unauthorized parties
to access to the systems features and data as well as
strengths, enabling a full risk assessment to be completed.
WHAT DOES KALI
• More than 600 penetration testing tools
• It is free and always will be
• Open source Git tree (A Git is a distributed version control
systems, it can be used as a server out of the box. Git refers
to dictionaries as “ trees”.)
• Kali adheres to the File System Hierarchy Standard,
allowing Linux users to easily locate binaries, support files,
• Wide-ranging wireless device support.
• Custom kernel, patched for injection.
• Developed in a secure environment.
• GPG signed packages and repositories which means every
package in Kali Linux is signed by each individual developer
who built and committed it, and the repositories subsequently
sign the packages as well.
• Multi-language support.
• Completely customizable.
• ARMEL and ARMHF support which means it is compatible
with single board systems like Raspberry Pi, Beagle Bone
• A minimal and trusted set of repositories, the set of
upstream software sources which Kali uses is kept to an
absolute minimum. Many new Kali users are tempted to
add additional repositories to their sources.list, but doing
so runs a very serious risk of breaking your Kali Linux
SHOULD IT BE USED BY
• Kali was specifically designed for penetrating professionally
through a system , hence ehy it is NOT recommended as a
distributed system like linux and may not be as easy to use as
linux which is a distributed sysytem.
• NOTE: Kali is an open source but not a wide open
source , it has a small and trusted team.
• In addition, misuse of security and penetration testing
tools within a network, particularly without specific
authorization, may cause irreparable damage and result
in significant consequences, personal and/or legal. “Not
understanding what you were doing” is not going to work
as an excuse.
• Kali has some minimum suggested specifications for
hardware. Depending upon the intended use, more may be
desired. This guide will be assuming that the reader will want
to install Kali as the only operating system on the computer.
• At least 10GB of disk space; strongly encouraged to have
• At least 512MB of RAM; more is encouraged especially for
• USB or CD/DVD boot support
• Kali Linux ISO available from https://www.kali.org/downloads/
FLEXIBILITY OF KALI
• Kali Linux can run natively when installed on a computer’s
hard disk or,
• It can be booted from a live CD or a live USB or, it can be run
on a virtual machine.
• It can also be installed within a chroot environment on an
KALI LINUX LIVE USB
• The specifics of this procedure will vary depending on
whether you’re doing it on a Windows, Linux, or OS X system.
• This guide will be assuming that a USB drive is available to
use as the installation media. Take note that the USB drive
should be as close to 4/8GB as possible and ALL DATA WILL
• After rebooting machine, you will be prompted with Kali Linux boot
menu, from the list choose Kali GNU/Linux without recovery mode to
boot normally to system.
• After system booting, you will get the login screen for KALI Linux 1.1.0,
use the default username as ‘root’ and password which you’ve set
during the installation time at #step 10.
We have successfully installed Kali Linux
1.1.0 and your system is ready to customize
as per your requirements.
Updating Kali Linux from Older Version to
To upgrade Kali from older versions to
newer 1.1.0, you can use the simple apt-
get commands. We don’t have to download
the ISO files and have a fresh new
installation, just issue the following
commands to upgrade the running system
into newer version.
PROGRAMS• nmap – a port scanner.
• Wireshark – a packet analyzer.
• John The Ripper – a password cracker.
• Aircrack-ng - a software suite for penetration testing wireless
• iKat - a hacking tool
• Hydra – Brute force password cracking tool.
• Maltego - Information on visualization and relationship analysis
• Metasloit- framework for developing and executing exploits.
• Owasp- Zap - Integrated pen-testing tool for web application.
• Sqlmap – finds SQL injection flaws for taking over of database
• Ubuntu is a general
desktop and server
• Designed to satisfy
general Desktop and
Server requirements and
also targeted in some
• Developed by Canonical
Ltd. and released back in
• Kali Linux is a specialized
• Primarily designed for
purposes like penetration
testing and digital forensics.
• Developed by Offensive
Security Ltd. and released
on 13 th March 2013.
• The latest version released
is Kali 2.0
• Open source
• Free software
• Live CD distribution
• No virus, Malware
• Low hardware cost
• Customizable and features.
• Closed source
• Cost s around Rs. 7000 for
only the non-pro OS
• No CD and Usb distribution
through common Cd’s.
• Insecure to an extent
• Can be effected by a virus and
• High hardware cost.
• Not customizable.
DEVELOPER’S POINT OF VIEW
Mati Aharoni is the founder and core developer of kali Linux
project, as well the CEO of Offensive Security.
According to him-
“It is critical to take the view of the attacker to see if
your defenses are working.”
This is the main idea behind the development of Kali Linux
• The main advantage of kali is that it is helps us test
penetration legally , giving us a benefit to find out loop holes
which serve as open entry points to our system.
• Basically helping us to be safe than sorry .
• It is highly secure .
• The disadvantage of this system is that it does not function
like a normal OS and cannot be used as one.
• It gives a complete access an knowledge of penetration , that
if not used wisely could have a near disastrous effect.