SlideShare une entreprise Scribd logo
1  sur  18
INTRODUCTION 
• Kali Linux is a Debian-derived Linux distribution And 
a member of UNIX OS Family. 
• Maintained and Funded by Offensive Security 
Limited. 
• Primarily designed for Penetration Testing and 
Digital Forensics. 
• Developed by Mati Aharoni and Devon Kearns of 
Offensive Security. 
• Rewrite of Backtrack.
History 
• Knoppix , ancestor of Kali Linux was the first ever 
bootable Live Linux Operating system , which is still in 
existence. 
• Knoppix project was then forked into Whoppix and then 
re-forked into WHAX. 
• WHAX was then re-branded and streamlined into the 
BackTrack , the predecessor of Kali Linux. 
• BackTrack had a long reign of almost seven years as the 
pentesters and hackers choice. 
• BackTrack is a customised native environment dedicated 
to hacking. As of 2011 it was used by more than four 
million amateur and professional security researchers.
History contd… 
• The latest version, BackTrack 5, is built on Ubuntu 
Lucid and contains some 350 penetration testing 
tools. 
• However, as of March 2013 the venerated distro 
was decommissioned and replaced by Kali Linux. 
• The main issue with BackTrack v1-v5 was that it 
was a headache for dependencies. Too many 
pentesting tools embedded within BackTrack all 
struggled to co-exist within the dependencies.
History contd… 
• The solution was to rebuild the distro bottom-up 
by making Kali Debian based. 
• Kali Linux has 300 tools which automatically work 
within the Kali ecosphere. Kali also has been 
created with the clean “File system Hierarchy 
Standard” and offers vast plug and play wireless 
support. 
• The main attraction was the ARM support 
provided by Kali Linux. Incidentally, you can also 
create your own .iso file with Kali through the 
Debian lifebuild feature.
More About KALI LINUX…. 
• Open Source 
• Has Monolithic type Kernel 
• Available in 32-bit and 64-bit images for use 
on hosts based on the x-86 instruction set. 
• Also available as an image for ARM 
architecture for use on Raspberry Pi and 
Samsung’s ARM Chromebook. 
• Its newest version Kali Linux 1.0.9 was 
released on 25 August 2014.
Features of KALI LINUX 
• Has more than 300 penetration testing tools. 
• Multilingual Support 
• Completely Customizable. 
• Free and Always will be. 
• Vast Wireless device support and Compatible 
with USB. 
• GPG signed packages and repos. 
• ARM support(ARMEL & ARMHF)-Kali Linux has 
ARM repositories integrated with mainline 
distribution.
What is Penetration Testing? 
“The process of evaluating systems , 
applications , and protocols with the intent of 
identifying vulnerabilities usually from the 
perspective of an unprivileged or anonymous 
user to determine potential real world 
impacts…” 
Or in other words 
…we try to break into stuff before the bad guys 
do…
Flexibility of KALI LINUX 
• Kali Linux can run natively when installed on 
a computer’s hard disk or, 
• Can be booted from a live CD or a live USB or, 
• It can run within a virtual machine. 
• Available for ARM devices like Samsung 
Chromebook, Samsung Galaxy Note 10.1, 
Raspberry Pi , CuBox , and a lot more. 
• KALI LINUX can also be installed within a 
chroot environment on an android device.
Kali Linux Penetration-Testing 
Programs 
Kali Linux is preinstalled with numerous penetration 
Testing programs:- 
• nmap - a port scanner. 
• Wireshark - a packet analyzer. 
• John The Ripper - a password cracker. 
• Aircrack-ng – a software suite for penetration 
testing wireless LANs. 
• iKat- a hacking tool
Difference between Kali Linux and 
Ubuntu 
Ubuntu 
• Ubuntu is a general 
desktop and server 
distribution. 
• Designed to satisfy general 
Desktop and Server 
requirements and also 
targeted in some Smart 
TV’s. 
• Developed by Canonical 
Ltd. and released back in 
2004. 
Kali Linux 
• Kali Linux is a specialized 
distribution. 
• Primarily designed for 
purposes like Penetration 
Testing and Digital 
Forensics. 
• Developed by Offensive 
Security Ltd. and released 
on 13th March 2013.
Information Security Certifications 
Offensive Security Ltd. Provides Courses and 
Certifications related to Kali Linux. These 
Certifications are namingly:- 
• OSCP- Offensive Security Certified Professional 
• OSWP- Offensive Security Wireless 
Professional 
• OSCE- Offensive Security Certified Expert 
• OSEE- Offensive Security Exploitation Expert 
• OSWE- Offensive Security Web Expert
Developer’s point of view… 
Mati Aharoni is the founder and core developer of Kali 
Linux project , as well the CEO of Offensive Security. 
Acc. To him-- 
“It is critical to take the view of the attacker to see if 
your defenses are working." 
This was the main idea behind the development of KALI 
LINUX.
 Official Website- www.kali.org 
 Wikipedia 
 www.offensive-security.com 
 www.coresecurity.com 
 www.slideshare.net 
 www.itnews.com.au 
 www.blackhat.com/us-14 
 www.concise-courses.com/security
Thank You
Any Queries ?
Presented By : 
Mr. Chanchal Dabriya 
Mr. Harsh Chawla 
At “Techno India NJR Institute of Technology , 
Udaipur(Raj.)”

Contenu connexe

Tendances

Tendances (20)

Linux security
Linux securityLinux security
Linux security
 
penetration test using Kali linux ppt
penetration test using Kali linux pptpenetration test using Kali linux ppt
penetration test using Kali linux ppt
 
Kali Linux Installation - VMware
Kali Linux Installation - VMwareKali Linux Installation - VMware
Kali Linux Installation - VMware
 
Linux basics
Linux basicsLinux basics
Linux basics
 
Kali linux summarised
Kali linux summarisedKali linux summarised
Kali linux summarised
 
kali linux
kali linuxkali linux
kali linux
 
Kali linux
Kali linuxKali linux
Kali linux
 
Understanding NMAP
Understanding NMAPUnderstanding NMAP
Understanding NMAP
 
penetration test using Kali linux seminar report
penetration test using Kali linux seminar reportpenetration test using Kali linux seminar report
penetration test using Kali linux seminar report
 
kali linux
kali linux kali linux
kali linux
 
Linux forensics
Linux forensicsLinux forensics
Linux forensics
 
Introduction to linux ppt
Introduction to linux pptIntroduction to linux ppt
Introduction to linux ppt
 
Linux
Linux Linux
Linux
 
Linux os and its features
Linux os and its featuresLinux os and its features
Linux os and its features
 
Investigating server logs
Investigating server logsInvestigating server logs
Investigating server logs
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware Analysis
 
Nessus Software
Nessus SoftwareNessus Software
Nessus Software
 
Linux operating system ppt
Linux operating system pptLinux operating system ppt
Linux operating system ppt
 
Introduction to linux
Introduction to linuxIntroduction to linux
Introduction to linux
 
Ch 4: Footprinting and Social Engineering
Ch 4: Footprinting and Social EngineeringCh 4: Footprinting and Social Engineering
Ch 4: Footprinting and Social Engineering
 

En vedette

Kali Linux - CleveSec 2015
Kali Linux - CleveSec 2015Kali Linux - CleveSec 2015
Kali Linux - CleveSec 2015
TGodfrey
 

En vedette (20)

Kali Linux - CleveSec 2015
Kali Linux - CleveSec 2015Kali Linux - CleveSec 2015
Kali Linux - CleveSec 2015
 
Kali Linux - Falconer
Kali Linux - FalconerKali Linux - Falconer
Kali Linux - Falconer
 
Tools kali
Tools kaliTools kali
Tools kali
 
Kali tools list with short description
Kali tools list with short descriptionKali tools list with short description
Kali tools list with short description
 
Kali ile Linux'e Giriş | IntelRAD
Kali ile Linux'e Giriş | IntelRADKali ile Linux'e Giriş | IntelRAD
Kali ile Linux'e Giriş | IntelRAD
 
Kali Linux
Kali LinuxKali Linux
Kali Linux
 
Kali linux
Kali linuxKali linux
Kali linux
 
Wireshark Basics
Wireshark BasicsWireshark Basics
Wireshark Basics
 
Kali Linux - Falconer - ISS 2014
Kali Linux - Falconer - ISS 2014Kali Linux - Falconer - ISS 2014
Kali Linux - Falconer - ISS 2014
 
Beyaz Şapkalı Hacker CEH Eğitimi - Bölüm 1, 2, 3
Beyaz Şapkalı Hacker CEH Eğitimi - Bölüm 1, 2, 3Beyaz Şapkalı Hacker CEH Eğitimi - Bölüm 1, 2, 3
Beyaz Şapkalı Hacker CEH Eğitimi - Bölüm 1, 2, 3
 
Shamsa altayer 10bg kali linux
Shamsa altayer 10bg   kali linuxShamsa altayer 10bg   kali linux
Shamsa altayer 10bg kali linux
 
Kalilinux
KalilinuxKalilinux
Kalilinux
 
BASIC OVERVIEW OF KALI LINUX
BASIC OVERVIEW OF KALI LINUXBASIC OVERVIEW OF KALI LINUX
BASIC OVERVIEW OF KALI LINUX
 
The Challenge of Locating ‘Culture’ in Location-Based Games
The Challenge of Locating ‘Culture’ in Location-Based GamesThe Challenge of Locating ‘Culture’ in Location-Based Games
The Challenge of Locating ‘Culture’ in Location-Based Games
 
Netcat
NetcatNetcat
Netcat
 
Kali linux
Kali linux Kali linux
Kali linux
 
Tấn công ARP Cache Poisoning (Man In The Middle) Attacks
Tấn công ARP Cache Poisoning (Man In The Middle) AttacksTấn công ARP Cache Poisoning (Man In The Middle) Attacks
Tấn công ARP Cache Poisoning (Man In The Middle) Attacks
 
(03 2013) guide to kali linux
(03 2013)   guide to kali linux(03 2013)   guide to kali linux
(03 2013) guide to kali linux
 
Kali Linux
Kali LinuxKali Linux
Kali Linux
 
Segurança na Internet - Google Hacking
Segurança na Internet - Google  HackingSegurança na Internet - Google  Hacking
Segurança na Internet - Google Hacking
 

Similaire à Kali Linux

technical-presentation-kali-linux.pptx hakkında
technical-presentation-kali-linux.pptx hakkındatechnical-presentation-kali-linux.pptx hakkında
technical-presentation-kali-linux.pptx hakkında
NuhAzgnolu1
 

Similaire à Kali Linux (20)

Kalilinux
KalilinuxKalilinux
Kalilinux
 
Operating system
Operating systemOperating system
Operating system
 
kali linix
kali linixkali linix
kali linix
 
Unleash the Power: How to Install Kali Linux With a Twist
Unleash the Power: How to Install Kali Linux With a TwistUnleash the Power: How to Install Kali Linux With a Twist
Unleash the Power: How to Install Kali Linux With a Twist
 
Operating project
Operating projectOperating project
Operating project
 
linux.pptx
linux.pptxlinux.pptx
linux.pptx
 
Kali Linux
Kali Linux Kali Linux
Kali Linux
 
Applied Security for Containers, OW2con'18, June 7-8, 2018, Paris
Applied Security for Containers, OW2con'18, June 7-8, 2018, ParisApplied Security for Containers, OW2con'18, June 7-8, 2018, Paris
Applied Security for Containers, OW2con'18, June 7-8, 2018, Paris
 
technical-presentation-kali-linux.pptx
technical-presentation-kali-linux.pptxtechnical-presentation-kali-linux.pptx
technical-presentation-kali-linux.pptx
 
Kali linux
Kali linuxKali linux
Kali linux
 
technical-presentation-kali-linux.pptx hakkında
technical-presentation-kali-linux.pptx hakkındatechnical-presentation-kali-linux.pptx hakkında
technical-presentation-kali-linux.pptx hakkında
 
Kali linux
Kali linuxKali linux
Kali linux
 
Kali linux
Kali linuxKali linux
Kali linux
 
Kali linux and some features [view in Full screen mode]
Kali linux and some features [view in Full screen mode]Kali linux and some features [view in Full screen mode]
Kali linux and some features [view in Full screen mode]
 
Linux a free and open source operating system
Linux a free and open source operating systemLinux a free and open source operating system
Linux a free and open source operating system
 
Linux a free and open source operating system
Linux a free and open source operating systemLinux a free and open source operating system
Linux a free and open source operating system
 
Kali Linux-Operating System Presentation.pptx
Kali Linux-Operating System Presentation.pptxKali Linux-Operating System Presentation.pptx
Kali Linux-Operating System Presentation.pptx
 
15 hour ali Linux is a unique distribution of Linux in that
15 hour ali Linux is a unique distribution of Linux in that 15 hour ali Linux is a unique distribution of Linux in that
15 hour ali Linux is a unique distribution of Linux in that
 
Introducing LinuxKit
Introducing LinuxKitIntroducing LinuxKit
Introducing LinuxKit
 
Infosecurity.be 2019: What are relevant open source security tools you should...
Infosecurity.be 2019: What are relevant open source security tools you should...Infosecurity.be 2019: What are relevant open source security tools you should...
Infosecurity.be 2019: What are relevant open source security tools you should...
 

Dernier

Dernier (20)

The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
ManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide Deck
 
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptxBUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
 
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 

Kali Linux

  • 1.
  • 2. INTRODUCTION • Kali Linux is a Debian-derived Linux distribution And a member of UNIX OS Family. • Maintained and Funded by Offensive Security Limited. • Primarily designed for Penetration Testing and Digital Forensics. • Developed by Mati Aharoni and Devon Kearns of Offensive Security. • Rewrite of Backtrack.
  • 3. History • Knoppix , ancestor of Kali Linux was the first ever bootable Live Linux Operating system , which is still in existence. • Knoppix project was then forked into Whoppix and then re-forked into WHAX. • WHAX was then re-branded and streamlined into the BackTrack , the predecessor of Kali Linux. • BackTrack had a long reign of almost seven years as the pentesters and hackers choice. • BackTrack is a customised native environment dedicated to hacking. As of 2011 it was used by more than four million amateur and professional security researchers.
  • 4. History contd… • The latest version, BackTrack 5, is built on Ubuntu Lucid and contains some 350 penetration testing tools. • However, as of March 2013 the venerated distro was decommissioned and replaced by Kali Linux. • The main issue with BackTrack v1-v5 was that it was a headache for dependencies. Too many pentesting tools embedded within BackTrack all struggled to co-exist within the dependencies.
  • 5. History contd… • The solution was to rebuild the distro bottom-up by making Kali Debian based. • Kali Linux has 300 tools which automatically work within the Kali ecosphere. Kali also has been created with the clean “File system Hierarchy Standard” and offers vast plug and play wireless support. • The main attraction was the ARM support provided by Kali Linux. Incidentally, you can also create your own .iso file with Kali through the Debian lifebuild feature.
  • 6.
  • 7. More About KALI LINUX…. • Open Source • Has Monolithic type Kernel • Available in 32-bit and 64-bit images for use on hosts based on the x-86 instruction set. • Also available as an image for ARM architecture for use on Raspberry Pi and Samsung’s ARM Chromebook. • Its newest version Kali Linux 1.0.9 was released on 25 August 2014.
  • 8. Features of KALI LINUX • Has more than 300 penetration testing tools. • Multilingual Support • Completely Customizable. • Free and Always will be. • Vast Wireless device support and Compatible with USB. • GPG signed packages and repos. • ARM support(ARMEL & ARMHF)-Kali Linux has ARM repositories integrated with mainline distribution.
  • 9. What is Penetration Testing? “The process of evaluating systems , applications , and protocols with the intent of identifying vulnerabilities usually from the perspective of an unprivileged or anonymous user to determine potential real world impacts…” Or in other words …we try to break into stuff before the bad guys do…
  • 10. Flexibility of KALI LINUX • Kali Linux can run natively when installed on a computer’s hard disk or, • Can be booted from a live CD or a live USB or, • It can run within a virtual machine. • Available for ARM devices like Samsung Chromebook, Samsung Galaxy Note 10.1, Raspberry Pi , CuBox , and a lot more. • KALI LINUX can also be installed within a chroot environment on an android device.
  • 11. Kali Linux Penetration-Testing Programs Kali Linux is preinstalled with numerous penetration Testing programs:- • nmap - a port scanner. • Wireshark - a packet analyzer. • John The Ripper - a password cracker. • Aircrack-ng – a software suite for penetration testing wireless LANs. • iKat- a hacking tool
  • 12. Difference between Kali Linux and Ubuntu Ubuntu • Ubuntu is a general desktop and server distribution. • Designed to satisfy general Desktop and Server requirements and also targeted in some Smart TV’s. • Developed by Canonical Ltd. and released back in 2004. Kali Linux • Kali Linux is a specialized distribution. • Primarily designed for purposes like Penetration Testing and Digital Forensics. • Developed by Offensive Security Ltd. and released on 13th March 2013.
  • 13. Information Security Certifications Offensive Security Ltd. Provides Courses and Certifications related to Kali Linux. These Certifications are namingly:- • OSCP- Offensive Security Certified Professional • OSWP- Offensive Security Wireless Professional • OSCE- Offensive Security Certified Expert • OSEE- Offensive Security Exploitation Expert • OSWE- Offensive Security Web Expert
  • 14. Developer’s point of view… Mati Aharoni is the founder and core developer of Kali Linux project , as well the CEO of Offensive Security. Acc. To him-- “It is critical to take the view of the attacker to see if your defenses are working." This was the main idea behind the development of KALI LINUX.
  • 15.  Official Website- www.kali.org  Wikipedia  www.offensive-security.com  www.coresecurity.com  www.slideshare.net  www.itnews.com.au  www.blackhat.com/us-14  www.concise-courses.com/security
  • 18. Presented By : Mr. Chanchal Dabriya Mr. Harsh Chawla At “Techno India NJR Institute of Technology , Udaipur(Raj.)”