Kali Linux : Most Advanced Penetration Testing

TRADELABOR has more than 20 years of experience in the control and treatment of air, working with an experienced and qualified technical staff and with the most advanced technology in this area, which together guarantee the quality of the services provided.

 

 

Development

Kali Linux has over 600[5] preinstalled penetration-testing programs, including Armitage (a graphical cyber attack management tool), Nmap (a port scanner), Wireshark (a packet analyzer), John the Ripper (a password cracker), Aircrack-ng (a software suite for penetration-testing wireless LANs), Burp suite and OWASP ZAP web application security scanners.[6][7]

It was developed by Mati Aharoni and Devon Kearns of Offensive Security through the rewrite of BackTrack, their previous information security testing Linux distribution based on Knoppix. Originally, it was designed with a focus on kernel auditing, from which it got its name Kernel Auditing LInux. The name is sometimes incorrectly assumed to come from Kali the Hindu goddess.[8][9] The third core developer, Raphaël Hertzog, joined them as a Debian expert.[10][11]

Kali Linux is based on the Debian Testing branch. Most packages Kali uses are imported from the Debian repositories.[12]

Kali Linux popularity grew when it was featured in multiple episodes of the TV series Mr. Robot. Tools highlighted in the show and provided by Kali Linux include Bluesniff, Bluetooth Scanner (btscanner), John the Ripper, Metasploit Framework, nmap, Shellshock, and Wget.[13][14][15]

With version 2019.4 in November 2019, the default user interface was switched from GNOME to Xfce, with a GNOME version still available.[2]

Requirements

  • Kali Linux requires a minimum of 3.6GB hard disk space for installation depending of the version, Version 2020.2 requires at least 3.6GB.[16]
  • A minimum of 257MB RAM for i386 and AMD64 architectures.
  • A bootable CD-DVD drive or a USB stick.

Recommended

The recommended hardware specification for smooth run are:

  • 20 GB of hard disk space, SSD preferred
  • At least 2048 MB of RAM

Supported platforms

Kali Linux is distributed in 32-bit and 64-bit images for use on hosts based on the x86 instruction set and as an image for the ARM architecture for use on the Beagle Board computer and on Samsung’s ARM Chromebook.[17]

The developers of Kali Linux aim to make Kali Linux available for even more ARM devices.[11]

Kali Linux is already available for Asus Chromebook Flip C100P, BeagleBone Black, HP Chromebook, CubieBoard 2, CuBoxCuBox-i, Raspberry Pi, EfikaMX, Odroid U2, Odroid XU, Odroid XU3, Samsung Chromebook, Utilite Pro, Galaxy Note 10.1, and SS808.[18]

With the arrival of Kali NetHunter, Kali Linux is also officially available on Android devices such as the Nexus 5, Nexus 6, Nexus 7, Nexus 9, Nexus 10, OnePlus One, and some Samsung Galaxy models. It has also been made available for more Android devices through unofficial community builds.

Kali Linux is available on Windows 10, on top of Windows Subsystem for Linux (WSL). The official Kali distribution for Windows can be downloaded from the Microsoft Store.[19]

Features

Kali Linux has a dedicated project set aside for compatibility and porting to specific Android devices, called Kali NetHunter.[20]

It is the first Open Source Android penetration testing platform for Nexus devices, created as a joint effort between the Kali community member “BinkyBear” and Offensive Security. It supports Wireless 802.11 frame injection, one-click MANA Evil Access Point setups, HID keyboard (Teensy like attacks), as well as Bad USB MITM attacks.[20]

BackTrack (Kali’s predecessor) contained a mode known as forensic mode, which was carried over to Kali via live boot. This mode is very popular for many reasons, partly because many Kali users already have a bootable Kali USB drive or CD, and this option makes it easy to apply Kali to a forensic job. When booted in forensic mode, the system doesn’t touch the internal hard drive or swap space and auto mounting is disabled. However, the developers recommend that users test these features extensively before using Kali for real world forensics.[21]

Tools

Kali Linux includes security tools, such as:[5]

These tools can be used for a number of purposes, most of which involve exploiting a victim network or application, performing network discovery, or scanning a target IP address. Many tools from the previous version (BackTrack) were eliminated to focus on the most popular penetration testing applications.

Offensive Security provides a book, Kali Linux Revealed,[22] and makes it available for free download.[23]

See also

References

  1. Jump up to:a b “Official Kali Linux Releases”. Retrieved 2020-08-29.
  2. Jump up to:a b Nestor, Marius. “Kali Linux Ethical Hacking OS Switches to Xfce Desktop, Gets New Look and Feel”softpedia. Retrieved 2019-11-29.
  3. ^
  4. ^
  5. Jump up to:a b “Kali Linux Penetration Testing Tools”tools.kali.org. Retrieved 2019-04-10.
  6. ^ “Kali Linux Metapackages”www.kali.org. Retrieved 2019-12-22.
  7. ^ “Kali Linux arrives as enterprise-ready version of BackTrack – The H Open: News and Features”www.h-online.com. Retrieved 2019-12-22.
  8. ^ Drake, Nate; March 2020, Brian Turner 10. “Best Linux distro for privacy and security in 2020”TechRadar. Retrieved 2020-04-15.
  9. ^ Gallagher, Sean (2019-07-05). “Penetration testing takes on new meaning when cyber meets Harlequin”Ars Technica. Retrieved 2020-04-15.
  10. ^ “The Birth of Kali Linux”. Offensive Security. 2012-12-12. Retrieved 2019-04-10.
  11. Jump up to:a b Orin, Andy (2014-12-03). “Behind the App: The Story of Kali Linux”. Lifehacker. Retrieved 2019-04-10Mati Aharoni: One of our goals with Kali is to provide images of the operating system for all sorts of exotic hardware—mainly ARM based. This includes everything from Raspberry Pi’s to tablets, to Android TV devices, with each piece of hardware having some unique property.
  12. ^ “Kali’s Relationship With Debian”. Kali Linux. 2013-03-11. Retrieved 2019-04-10.
  13. ^ Leroux, Sylvain. “The Kali Linux Review You Must Read Before You Start Using it”itsfoss.com. Retrieved 2020-04-15.
  14. ^ Grauer, Yael (2015-08-26). “A Peek Inside Mr. Robot’s Toolbox”WiredISSN 1059-1028. Retrieved 2020-04-15.
  15. ^ “Exploring the Hacker Tools of Mr Robot”HackerTarget.com. 2015-08-21. Retrieved 2020-04-15.
  16. ^ “Kali Linux Hard Disk Install”Kali Linux Official Documentation. Retrieved 2020-05-28.
  17. ^ Pauli, Darren (2013-03-13). “BackTrack successor Kali Linux launched”SC Magazine. Retrieved 2019-04-10.
  18. ^ “04. Kali Linux on ARM”. Retrieved 2019-09-04.
  19. ^ muts (2018-03-05). “Kali Linux in the Windows App Store”. Kali Linux. Retrieved 2019-04-10.
  20. Jump up to:a b “Kali Linux NetHunter for Nexus and OnePlus”. Retrieved 2019-04-10.
  21. ^ “Kali Linux Forensics Mode”. Retrieved 2019-04-10.
  22. ^ Hertzog, Raphael; O’Gorman, Jim; Aharoni, Mati (2017-06-05). Kali Linux Revealed: Mastering the Penetration Testing Distribution. Offsec Press. ISBN 978-0-9976156-0-9.
  23. ^ Kali Linux Revealed (PDF).

 

Continue at:  https://en.wikipedia.org/wiki/Kali_Linux

 

The text above is owned by the site above referred.

Here is only a small part of the article, for more please follow the link

Also see:

www.manostaxx.com

 

Manostaxx
Manostaxx – Industrial Management Consulting
Posted in IT

Leave a Reply

Your email address will not be published.