3. Outlines
Introduction of group members.
Types of software.
What is linux.
What is kali linux.
Advantages of kali linux.
Installation of kali linux.
Attacks of Kali linux.
1. Denial of server Attack.
a) Dos Attack
b) D-Dos Attack
2. Aircrack-ng
3. The FatRat and metasploit Attack.
4. Introduction to Group Members
Jawad: 18-CS-10
Afaq: 18-CS-30
Saifullah: 18-CS-50
Daud: 18-CS-40
Presentation #1
5. Types of Software
There are two types of Software.
System software.
Application software.
Types of Operating Software.
Microsoft Window.
Linux.
Unix.
And many more.
6. Kali linux Ubuntu
What is Linux?
Operating software that manages computer hardware
Types of Linux
There are many types of linux , such as
7. Kali Linux?
Kali linux are used to perform allots of important task such as
Reverse Engineering Security ResearchPenetration Testing
8. Advantages of Kali Linux
More than 600 Penetration
Free and always will be
Develop by individual
Multi-language Support
Completely customizable
Rooted tool
Can be Run without installing
Virus free
9. How to install Kali Linux
There are several different ways to install kali and run it
on your operating system
• For example
In dual mode On android With usb on HDD
10. Attacks of Kali
There are more then 600 build-in tools in kali which mean that
we can perform more then 600 attacks with kali . but we will
discus some here with details , which are given below.
Dos Attack Aircrack-ng Fatrat And Metasploit attack
11. Denial Of Server Attack ( Dos )
Dos is used for flooding on any deserted server ( Websites )
The meant of flooding is to send fake request by bot ( fake user ) to
server
Every servers have certain limits to handle No. of request in a
particular time
When the flooding increases beyond the limit of the server , then
server become down
After downing the server by Dos when real user send request to
server to serve that particular web, then server shows an error of 505
to him
By 505 error server try to said the real user that I am busy right now I
cant serve you
13. Types of Dos
There are two types of Dos attack
Dos Attack
D-Dos Attack
14. How to perform Dos
There are allots of tools to perform Dos. But we will discus here
about most powerful tool that is “slowsloris”
Command: python3 slowloris.py example.com
15. Aircrack-ng
Aircrack-ng is build-in tool and used to crack air
With air our mean to crack signals in air. And in our CS these
signals are of Wi-Fi
With Aircrack-ng we judge a particular wifi. e-g No. of packets
received or send, bassid, station id, etc
By using bassid and station id attacker send packets toward
selected wifi
These packets blocks the connection between wifi device and
connected devices. And send his own wifi with name of selected
wifi
By considering user own wifi, he/she enters password in it and
Aircrack cracks it
16. Judging the Wi-Fi
Judging bassid and station id
Judging Wi-Fi name
Judging number of packets
Judging Wi-Fi security
17. Forcing devices to disconnect
Aireplay-ng is a by default command and used for sending packets
Command “-o ” is used for sending number of packets attacker wants to send
Command “-a ” is used for bassid of selected Wi-Fi
Command “-c ” is used for station id of selected Wi-Fi
“ mon0 “ is by default command for Wi-Fi
18. The FatRat and Metasploit Attack
To hack any system ( Operating system, Android or Apple ) you
need two things.
1. Virus ( that leeks deserted information from target device )
2. Linker ( that connect virus with attacker device
For making virus two things are needed.
1. “Ip” address of attacker
2. Value of “lport”
If attacker can access target device , he will diffidently make virus in
shape of software ( operating sys ) or App ( android, Apple ).
If attacker cannot access target device ,then he will make virus in
deserted shape of target choice ( pic, document ,link ) and used
communication site.
Fatrat is used for making virus without typing any commands.
After reaching virus on target device ,next step of attacker will be to
link his device with virus and Metasploit is used for this.
Metasploit is used to perform allots of tasks ,but for this particular
task multi/handler is used
Attacker will connect multi/handler by using “ip” and “lport”
19. Use of FatRat
For opening FatRat tool after installing write command “fatrat” on terminal
For creating virus ( backdoor ) , simply type “1” and press enter
After opening “msfvenom” for making deserted virus , simply type 1, 2, 3…
20. Use of Metasploit
Metasploit is a build-in tool, for opening it simply type command “msfconsole”
on terminal.
It will take several minutes for opening , depending upon your operating
system power.
21. Opening multi/handler in Metasploit
For opening multi/handler type command “use exploit/multi/handler”
Tell him about your virus shape in second command
Set your lhost ( ip address )
Set your lport and type “exploit”
multi/handler will search about your virus , if given values to him will exist
then with in less time he will make connection with virus depending upon
both attacker and target internet speed.