3. Web applications, networks, software,databases… are
all vulnerable, Ethical hacking is a solution to decrease
the chance of getting hacked !
It’s a proactive way of testing your applications by
simulating an attack that's similar to a real attack that
could occur on any time…
6. Kali Linux Features!
- 20GB hard disk space for installation.
- A minimum of 1GB RAM.
- A bootable CD-DVD drive or a USB
stick.
Requirements :
7. Kali Linux Features!
More than 600 penetration testing tools included
Kali Linux Features!
Kali has more than 435 extra
tools
(apt-get install kali-linux-
all)
11. Kali Vs Windows.
Open Source
Free
Secure
Live CD distribution
Customizable / add features
Closed Source
Pay for it
Windows 10 Pro will
cost $199
Vulnerable
No !
Not Customizable :)
16. WiFi Attacks
Evil twin attack
1) Scan networks
2) Launch a FakeAP instance to imitate the original access point
3) Deauthenticates all users connected to the target network
4) A fake DNS server is launched
5) Each submitted password is verified by the handshake captured earlier
6) The attack will automatically terminate, as soon as a correct password is submitted
17. MITM Attack
“Man in the middle” is simply an attack where the hacker secretly
Sniff the data between two parties.
18. C0nclu$I0n
The open source community is a
large domain where we can explore,
I highly recommend everyone to join
it, code , share , happy hacking ...