ALL About - Everything You Need To Know About Kali Linux
More usually than not, specific in operation systems get tied
to bound tasks. something associated with graphics or content creation
brings up macOS in our mind. Similarly, any instance of hacking or simply
usually trivial around with network utilities is additionally mapped to a
selected software system which is Kali UNIX operating system. during this
article, I’ll be writing a general introduction to Kali UNIX operating
system and the way it will be used for moral hacking. the subsequent topics
area unit mentioned during this write up concerning ‘Ethical Hacking
exploitation Kali Linux’:
What is Kali Linux?
Kali Linux is a Debian-based Linux distribution. It is a meticulously crafted OS that specifically caters to the likes of network analysts & penetration testers. The presence of a plethora of tools that come pre-installed with Kali transforms it into an ethical hacker’s swiss-knife.
Why do hackers use Kali Linux?
Previously called go back, Kali Linux advertises itself as a a lot of polished successor with a lot of testing-centric tools, not like go back that had multiple tools that might serve a similar purpose, in turn, creating it jampacked with unessential utilities. This makes moral hacking exploitation Kali Linux a simplified task.
What is Kali Linux used for?
Kali Linux is mainly used for advanced Penetration Testing and Security Auditing. Kali contains several hundred tools which are geared towards various information security tasks, such as Penetration Testing, Security research, Computer Forensics and Reverse Engineering.
Is Kali Linux illegal?
Kali Linux is not illegal by itself. After all, it is just an OS. It is however a tool for hacking too and when someone uses it especially for hacking, it is illegal. It is legal If you install it for useful purposes like learning, or teaching, or using it in the way to fortify your software or your network as It is not illegal to install any Operating System which is licensed and available for download.
Who developed Kali Linux? (Development of Kali Linux)
Mati Aharoni and Deavon Kearns are the core developers of Kali Linux. It was a rewrite of Backtrack Linux, which was another penetration testing centric Linux distribution. The development of Kali is set according to the Debian standards as it imports the majority of its code from Debian repositories. The development began in early March 2012, amongst a small group of developers. Only a very selected few developers were allowed to commit packages, that too in a protected environment. Kali Linux came out of development with its first release in 2013. Since then, Kali Linux has been through a number of major updates. The development of these updates is handled by Offensive Security.
Why Use Kali Linux?
There are a wide array of reasons as to why one should use Kali Linux. Let me list down a few of them:
- As free as it can get – Kali Linux has been and will always be free to use.
- More tools than you could think of – Kali Linux comes with over 600 different penetration testing and security analytics related tool.
- Open-source – Kali, being a member of the Linux family, follows the widely appreciated open-source model. Their development tree is publicly viewable on Git and all of the code is available for your tweaking purposes.
- Multi-language Support – Although penetration tools tend to be written in English, it has been ensured that Kali includes true multilingual support, allowing more users to operate in their native language and locate the tools they need for the job.
- Completely customizable – The developers at offensive security understand that not everyone will agree with their design model, so they have made it as easy as possible for the more adventurous user to customize Kali Linux to their liking, all the way down to the kernel.
System Requirements for Kali Linux- (How much RAM does Kali Linux
need?)
Installing Kali is a piece of cake. All you have to make sure is that you have the compatible hardware. Kali is supported on i386, amd64, and ARM (both ARMEL and ARMHF) platforms. The hardware requirements are minimal as listed below, although better hardware will naturally provide better performance.
- A minimum of 20 GB disk space for the Kali Linux install.
- RAM for i386 and amd64 architectures, minimum: 1GB, recommended: 2GB or more.
- CD-DVD Drive / USB boot support/ VirtualBox
What tools come with Kali Linux? (List of Tools)
Below is a list of tools that come pre-installed for ethical hacking
using Kali Linux. This list is by no means expansive as Kali has a plethora
of tools, all of which cannot be listed and explained in one article.
1. Aircrack-ng
Aircrack-ng is a suite of tools used to assess WiFi network security. It focuses on key areas of WiFi security:
- Monitoring: Packet capture and export of data to text files for further processing by third-party tools
- Attacking: Replay attacks, de-authentication, fake access points, and others via packet injection
- Testing: Checking WiFi cards and driver capabilities (capture and injection)
- Cracking: WEP and WPA PSK (WPA 1 and 2)
All tools are command line which allows for heavy scripting. A lot of GUIs have taken advantage of this feature. It works primarily Linux but also Windows, OS X, FreeBSD, OpenBSD, NetBSD, as well as Solaris.
2. Nmap
Network Mapper, also commonly known as Nmap, is a free and open source utility for network discovery and security auditing. Nmap uses raw IP packets in stealthy ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.
3. THC Hydra
When you need to brute force crack a remote authentication service, Hydra is often the tool of choice. It can perform rapid dictionary attacks against more than 50 protocols, including telnet, FTP, HTTP, HTTPs, SMB, several databases, and much more. it can be used to crack into web scanners, wireless networks, packet crafters, etc.
4. Nessus
Nessus is a remote scanning tool that you can use to check computers for security vulnerabilities. It does not actively block any vulnerabilities that your computers have but it will be able to sniff them out by quickly running 1200+ vulnerability checks and throwing alerts when any security patches need to be made.
5. WireShark
WireShark is an open-source packet analyzer that you can use free of charge. With it, you can see the activities on a network from a microscopic level coupled with pcap file access, customizable reports, advanced triggers, alerts, etc. It is reportedly the world’s most widely-used network protocol analyzer for Linux.
termux
java