SlideShare a Scribd company logo
1 of 10
Kali Linux
Futaim
Bin Lahej
10BG
What is Kali Linux?
Kali Linux is a Debian-derived Linux distribution designed
for digital forensics and penetration testing. It is
maintained and funded by Offensive Security Ltd. Mati
Aharoni, Devon Kearns and Raphaël Hertzog are the core
developers.
Kali Linux was
released on the 13th
March, 2013 as a
complete, top-to-
bottom rebuild of
BackTrack Linux,
adhering completely
to Debian
development
standards.
Information about Kali Linux:
More than 600 penetration testing tools
included: After reviewing every tool that
was included in BackTrack, we eliminated a
great number of tools that either simply did
not work or which duplicated other tools
that provided the same or similar
functionality. Details on what’s included are
on the Kali Tools site.
Free (as in beer) and always will be: Kali Linux, like BackTrack, is completely
free of charge and always will be. You will never, ever have to pay for Kali
Linux.
Open source Git tree: We are committed to the open source development
model and our development tree is available for all to see. All of the
source code which goes into Kali Linux is available for anyone who wants to
tweak or rebuild packages to suit their specific needs.
FHS compliant: Kali adheres to the File system Hierarchy Standard, allowing
Linux users to easily locate binaries, support files, libraries, etc.
Wide-ranging wireless device support: A regular sticking point with Linux
distributions has been supported for wireless interfaces. We have built Kali
Linux to support as many wireless devices as we possibly can, allowing it to
run properly on a wide variety of hardware and making it compatible with
numerous USB and other wireless devices.
Custom kernel, patched for injection: As penetration testers, the
development team often needs to do wireless assessments, so our
kernel has the latest injection patches included.
Developed in a secure environment: The Kali Linux team is made up of
a small group of individuals who are the only ones trusted to commit
packages and interact with the repositories, all of which is done using
multiple secure protocols.
GPG signed packages and repositories: Every package in Kali Linux
is signed by each individual developer who built and committed it, and
the repositories subsequently sign the packages as well.
Multi-language support: Although penetration tools tend to be written in
English, we have ensured that Kali includes true multilingual support,
allowing more users to operate in their native language and locate the
tools they need for the job.
Completely customizable: We thoroughly understand that not everyone
will agree with our design decisions, so we have made it as easy as
possible for our more adventurous users to customize Kali Linux to their
liking, all the way down to the kernel.
Kali Linux is
specifically tailored
to the needs of
penetration testing
professionals, and
therefore all
documentation on
this site assumes
prior knowledge of,
and familiarity with,
the Linux operating
system in general.

More Related Content

What's hot

penetration test using Kali linux seminar report
penetration test using Kali linux seminar reportpenetration test using Kali linux seminar report
penetration test using Kali linux seminar reportAbhayNaik8
 
Kali linux
Kali linux Kali linux
Kali linux Fa6ma_
 
penetration test using Kali linux ppt
penetration test using Kali linux pptpenetration test using Kali linux ppt
penetration test using Kali linux pptAbhayNaik8
 
Linux/Unix Night - (PEN) Testing Toolkits (English)
Linux/Unix Night - (PEN) Testing Toolkits (English)Linux/Unix Night - (PEN) Testing Toolkits (English)
Linux/Unix Night - (PEN) Testing Toolkits (English)Jelmer de Reus
 
Kali Linux - Falconer - ISS 2014
Kali Linux - Falconer - ISS 2014Kali Linux - Falconer - ISS 2014
Kali Linux - Falconer - ISS 2014TGodfrey
 
Shamsa altayer 10bg kali linux
Shamsa altayer 10bg   kali linuxShamsa altayer 10bg   kali linux
Shamsa altayer 10bg kali linuxshamsaot
 
BASIC OVERVIEW OF KALI LINUX
BASIC OVERVIEW OF KALI LINUXBASIC OVERVIEW OF KALI LINUX
BASIC OVERVIEW OF KALI LINUXDeborah Akuoko
 
(03 2013) guide to kali linux
(03 2013)   guide to kali linux(03 2013)   guide to kali linux
(03 2013) guide to kali linuxjulius77
 
Parrot Security OS | Introduction to Parrot Security OS | Cybersecurity Train...
Parrot Security OS | Introduction to Parrot Security OS | Cybersecurity Train...Parrot Security OS | Introduction to Parrot Security OS | Cybersecurity Train...
Parrot Security OS | Introduction to Parrot Security OS | Cybersecurity Train...Edureka!
 

What's hot (19)

Kali linux
Kali linuxKali linux
Kali linux
 
kali linux.pptx
kali linux.pptxkali linux.pptx
kali linux.pptx
 
Kali linux
Kali linuxKali linux
Kali linux
 
penetration test using Kali linux seminar report
penetration test using Kali linux seminar reportpenetration test using Kali linux seminar report
penetration test using Kali linux seminar report
 
Kali linux summarised
Kali linux summarisedKali linux summarised
Kali linux summarised
 
Kali linux
Kali linuxKali linux
Kali linux
 
Kali linux
Kali linux Kali linux
Kali linux
 
penetration test using Kali linux ppt
penetration test using Kali linux pptpenetration test using Kali linux ppt
penetration test using Kali linux ppt
 
Linux/Unix Night - (PEN) Testing Toolkits (English)
Linux/Unix Night - (PEN) Testing Toolkits (English)Linux/Unix Night - (PEN) Testing Toolkits (English)
Linux/Unix Night - (PEN) Testing Toolkits (English)
 
Kalilinux
KalilinuxKalilinux
Kalilinux
 
Kali Linux - Falconer - ISS 2014
Kali Linux - Falconer - ISS 2014Kali Linux - Falconer - ISS 2014
Kali Linux - Falconer - ISS 2014
 
Kali Linux
Kali LinuxKali Linux
Kali Linux
 
Kali linux tutorial
Kali linux tutorialKali linux tutorial
Kali linux tutorial
 
Shamsa altayer 10bg kali linux
Shamsa altayer 10bg   kali linuxShamsa altayer 10bg   kali linux
Shamsa altayer 10bg kali linux
 
Kali presentation
Kali presentationKali presentation
Kali presentation
 
Kalilinux
KalilinuxKalilinux
Kalilinux
 
BASIC OVERVIEW OF KALI LINUX
BASIC OVERVIEW OF KALI LINUXBASIC OVERVIEW OF KALI LINUX
BASIC OVERVIEW OF KALI LINUX
 
(03 2013) guide to kali linux
(03 2013)   guide to kali linux(03 2013)   guide to kali linux
(03 2013) guide to kali linux
 
Parrot Security OS | Introduction to Parrot Security OS | Cybersecurity Train...
Parrot Security OS | Introduction to Parrot Security OS | Cybersecurity Train...Parrot Security OS | Introduction to Parrot Security OS | Cybersecurity Train...
Parrot Security OS | Introduction to Parrot Security OS | Cybersecurity Train...
 

Viewers also liked

Blogs como herramienta de explicitación de conocimiento
Blogs como herramienta de explicitación de conocimientoBlogs como herramienta de explicitación de conocimiento
Blogs como herramienta de explicitación de conocimientoPablo Antonio Alvarado Ruiz
 
Leonard White -ServiceMaint- (Jan 14 2016)
Leonard White -ServiceMaint- (Jan 14 2016)Leonard White -ServiceMaint- (Jan 14 2016)
Leonard White -ServiceMaint- (Jan 14 2016)leonard White
 
Pharmatest Overview
Pharmatest OverviewPharmatest Overview
Pharmatest Overviewkakonenrami
 
01. english version operating system
01. english version   operating system01. english version   operating system
01. english version operating systemJimmi Sitorus
 
Жүйке жүйесінің бөлімдері. Жұлынның құрылысы мен қызметі
Жүйке жүйесінің бөлімдері. Жұлынның құрылысы мен қызметіЖүйке жүйесінің бөлімдері. Жұлынның құрылысы мен қызметі
Жүйке жүйесінің бөлімдері. Жұлынның құрылысы мен қызметіАйбек Қуандықұлы
 
Makalah Tentang Jaringan RT/RW-Net
Makalah Tentang Jaringan RT/RW-NetMakalah Tentang Jaringan RT/RW-Net
Makalah Tentang Jaringan RT/RW-Netnisa nuraeni
 
Оқушылардың тіл меңгеру деңгейін анықтауда
Оқушылардың тіл меңгеру деңгейін анықтаудаОқушылардың тіл меңгеру деңгейін анықтауда
Оқушылардың тіл меңгеру деңгейін анықтаудаBakytgul Salykhova
 
Әлеуметтік желілер арқылы ресурстарды дамыту
Әлеуметтік желілер арқылы ресурстарды дамытуӘлеуметтік желілер арқылы ресурстарды дамыту
Әлеуметтік желілер арқылы ресурстарды дамытуBakytgul Salykhova
 
Hidup Sihat Tanpa Kanser
Hidup Sihat Tanpa KanserHidup Sihat Tanpa Kanser
Hidup Sihat Tanpa KanserIffah Anuar
 
ю. трифонов. мы любим людей успеха1
ю. трифонов. мы любим людей успеха1ю. трифонов. мы любим людей успеха1
ю. трифонов. мы любим людей успеха1Айбек Қуандықұлы
 
Opt extensive and overview of excise tax. dst and ctc.feb.2011
Opt extensive and overview of excise tax. dst and ctc.feb.2011Opt extensive and overview of excise tax. dst and ctc.feb.2011
Opt extensive and overview of excise tax. dst and ctc.feb.2011Phil Taxation
 

Viewers also liked (20)

Краудсорсинг
КраудсорсингКраудсорсинг
Краудсорсинг
 
Blogs como herramienta de explicitación de conocimiento
Blogs como herramienta de explicitación de conocimientoBlogs como herramienta de explicitación de conocimiento
Blogs como herramienta de explicitación de conocimiento
 
Leonard White -ServiceMaint- (Jan 14 2016)
Leonard White -ServiceMaint- (Jan 14 2016)Leonard White -ServiceMaint- (Jan 14 2016)
Leonard White -ServiceMaint- (Jan 14 2016)
 
Instalasi SO Jar 1
Instalasi SO Jar 1Instalasi SO Jar 1
Instalasi SO Jar 1
 
Checklist 1
Checklist 1Checklist 1
Checklist 1
 
Tercera unidad
Tercera unidadTercera unidad
Tercera unidad
 
Pharmatest Overview
Pharmatest OverviewPharmatest Overview
Pharmatest Overview
 
01. english version operating system
01. english version   operating system01. english version   operating system
01. english version operating system
 
Investigacion educativa
Investigacion educativaInvestigacion educativa
Investigacion educativa
 
Жүйке жүйесінің бөлімдері. Жұлынның құрылысы мен қызметі
Жүйке жүйесінің бөлімдері. Жұлынның құрылысы мен қызметіЖүйке жүйесінің бөлімдері. Жұлынның құрылысы мен қызметі
Жүйке жүйесінің бөлімдері. Жұлынның құрылысы мен қызметі
 
Makalah Tentang Jaringan RT/RW-Net
Makalah Tentang Jaringan RT/RW-NetMakalah Tentang Jaringan RT/RW-Net
Makalah Tentang Jaringan RT/RW-Net
 
Оқушылардың тіл меңгеру деңгейін анықтауда
Оқушылардың тіл меңгеру деңгейін анықтаудаОқушылардың тіл меңгеру деңгейін анықтауда
Оқушылардың тіл меңгеру деңгейін анықтауда
 
Әлеуметтік желілер арқылы ресурстарды дамыту
Әлеуметтік желілер арқылы ресурстарды дамытуӘлеуметтік желілер арқылы ресурстарды дамыту
Әлеуметтік желілер арқылы ресурстарды дамыту
 
Hidup Sihat Tanpa Kanser
Hidup Sihat Tanpa KanserHidup Sihat Tanpa Kanser
Hidup Sihat Tanpa Kanser
 
introduction
introductionintroduction
introduction
 
ю. трифонов. мы любим людей успеха1
ю. трифонов. мы любим людей успеха1ю. трифонов. мы любим людей успеха1
ю. трифонов. мы любим людей успеха1
 
Жорғалаушылар класы
Жорғалаушылар класыЖорғалаушылар класы
Жорғалаушылар класы
 
ұлттық ойын
ұлттық ойынұлттық ойын
ұлттық ойын
 
Buku hacker Best Seller Part 1
Buku hacker Best Seller Part 1Buku hacker Best Seller Part 1
Buku hacker Best Seller Part 1
 
Opt extensive and overview of excise tax. dst and ctc.feb.2011
Opt extensive and overview of excise tax. dst and ctc.feb.2011Opt extensive and overview of excise tax. dst and ctc.feb.2011
Opt extensive and overview of excise tax. dst and ctc.feb.2011
 

Similar to Kali linux

Operating project
Operating projectOperating project
Operating projectISMAT CH
 
Unleash the Power: How to Install Kali Linux With a Twist
Unleash the Power: How to Install Kali Linux With a TwistUnleash the Power: How to Install Kali Linux With a Twist
Unleash the Power: How to Install Kali Linux With a TwistFredReynolds2
 
Kali Linux - CleveSec 2015
Kali Linux - CleveSec 2015Kali Linux - CleveSec 2015
Kali Linux - CleveSec 2015TGodfrey
 
How to install Kali Linux? | Edureka
How to install Kali Linux? | EdurekaHow to install Kali Linux? | Edureka
How to install Kali Linux? | EdurekaEdureka!
 
Kali Linux-Operating System Presentation.pptx
Kali Linux-Operating System Presentation.pptxKali Linux-Operating System Presentation.pptx
Kali Linux-Operating System Presentation.pptxSumaiyaSinja1
 
Hackers OS Kali Linux for Penetration Testing - By Cyber Expert Amish Patel -...
Hackers OS Kali Linux for Penetration Testing - By Cyber Expert Amish Patel -...Hackers OS Kali Linux for Penetration Testing - By Cyber Expert Amish Patel -...
Hackers OS Kali Linux for Penetration Testing - By Cyber Expert Amish Patel -...Amish Patel
 
Slide sistem operasi
Slide sistem operasiSlide sistem operasi
Slide sistem operasitheogrouptech
 
Linux Operating SystemMigration ProposalCMIT 391 - Section .docx
Linux Operating SystemMigration ProposalCMIT 391 -  Section .docxLinux Operating SystemMigration ProposalCMIT 391 -  Section .docx
Linux Operating SystemMigration ProposalCMIT 391 - Section .docxwashingtonrosy
 

Similar to Kali linux (20)

Operating project
Operating projectOperating project
Operating project
 
Operating system
Operating systemOperating system
Operating system
 
Kal i linux
Kal i linuxKal i linux
Kal i linux
 
Kali Linux
Kali Linux Kali Linux
Kali Linux
 
Unleash the Power: How to Install Kali Linux With a Twist
Unleash the Power: How to Install Kali Linux With a TwistUnleash the Power: How to Install Kali Linux With a Twist
Unleash the Power: How to Install Kali Linux With a Twist
 
Kali linux
Kali linuxKali linux
Kali linux
 
Kali linux.ppt
Kali linux.pptKali linux.ppt
Kali linux.ppt
 
kali linux.pptx
kali linux.pptxkali linux.pptx
kali linux.pptx
 
Kali Linux
Kali LinuxKali Linux
Kali Linux
 
Kali Linux - CleveSec 2015
Kali Linux - CleveSec 2015Kali Linux - CleveSec 2015
Kali Linux - CleveSec 2015
 
Kali linux os
Kali linux osKali linux os
Kali linux os
 
kali linux.pptx
kali linux.pptxkali linux.pptx
kali linux.pptx
 
How to install Kali Linux? | Edureka
How to install Kali Linux? | EdurekaHow to install Kali Linux? | Edureka
How to install Kali Linux? | Edureka
 
Kali Linux-Operating System Presentation.pptx
Kali Linux-Operating System Presentation.pptxKali Linux-Operating System Presentation.pptx
Kali Linux-Operating System Presentation.pptx
 
Sistem operasi
Sistem operasiSistem operasi
Sistem operasi
 
kali linix
kali linixkali linix
kali linix
 
Hackers OS Kali Linux for Penetration Testing - By Cyber Expert Amish Patel -...
Hackers OS Kali Linux for Penetration Testing - By Cyber Expert Amish Patel -...Hackers OS Kali Linux for Penetration Testing - By Cyber Expert Amish Patel -...
Hackers OS Kali Linux for Penetration Testing - By Cyber Expert Amish Patel -...
 
Slide sistem operasi
Slide sistem operasiSlide sistem operasi
Slide sistem operasi
 
Linux Operating SystemMigration ProposalCMIT 391 - Section .docx
Linux Operating SystemMigration ProposalCMIT 391 -  Section .docxLinux Operating SystemMigration ProposalCMIT 391 -  Section .docx
Linux Operating SystemMigration ProposalCMIT 391 - Section .docx
 
Kali kinux1
Kali kinux1Kali kinux1
Kali kinux1
 

Kali linux

  • 2. What is Kali Linux? Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. It is maintained and funded by Offensive Security Ltd. Mati Aharoni, Devon Kearns and Raphaël Hertzog are the core developers.
  • 3.
  • 4. Kali Linux was released on the 13th March, 2013 as a complete, top-to- bottom rebuild of BackTrack Linux, adhering completely to Debian development standards.
  • 5. Information about Kali Linux: More than 600 penetration testing tools included: After reviewing every tool that was included in BackTrack, we eliminated a great number of tools that either simply did not work or which duplicated other tools that provided the same or similar functionality. Details on what’s included are on the Kali Tools site.
  • 6. Free (as in beer) and always will be: Kali Linux, like BackTrack, is completely free of charge and always will be. You will never, ever have to pay for Kali Linux. Open source Git tree: We are committed to the open source development model and our development tree is available for all to see. All of the source code which goes into Kali Linux is available for anyone who wants to tweak or rebuild packages to suit their specific needs.
  • 7. FHS compliant: Kali adheres to the File system Hierarchy Standard, allowing Linux users to easily locate binaries, support files, libraries, etc. Wide-ranging wireless device support: A regular sticking point with Linux distributions has been supported for wireless interfaces. We have built Kali Linux to support as many wireless devices as we possibly can, allowing it to run properly on a wide variety of hardware and making it compatible with numerous USB and other wireless devices.
  • 8. Custom kernel, patched for injection: As penetration testers, the development team often needs to do wireless assessments, so our kernel has the latest injection patches included. Developed in a secure environment: The Kali Linux team is made up of a small group of individuals who are the only ones trusted to commit packages and interact with the repositories, all of which is done using multiple secure protocols. GPG signed packages and repositories: Every package in Kali Linux is signed by each individual developer who built and committed it, and the repositories subsequently sign the packages as well.
  • 9. Multi-language support: Although penetration tools tend to be written in English, we have ensured that Kali includes true multilingual support, allowing more users to operate in their native language and locate the tools they need for the job. Completely customizable: We thoroughly understand that not everyone will agree with our design decisions, so we have made it as easy as possible for our more adventurous users to customize Kali Linux to their liking, all the way down to the kernel.
  • 10. Kali Linux is specifically tailored to the needs of penetration testing professionals, and therefore all documentation on this site assumes prior knowledge of, and familiarity with, the Linux operating system in general.