Tuesday 25 October 2016

Kali Linux
 https://www.kali.org/

Developer Offensive Security
OS family Unix-like
Working state Active
Latest release 2016.2[1] / August 31, 2016; 43 days ago
Platforms x86, x86-64, armel, armhf
Kernel type Monolithic kernel
Default user interface GNOME 3
License Various
Official website www.kali.org
Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. It is maintained and funded by Offensive Security Ltd. Mati Aharoni, Devon Kearns and Raphaël Hertzog are the core developers.

Contents  [hide] 
1 Development
2 Supported platforms
3 Features
4 Tools
5 Popular culture
6 See also
7 References
8 External links
Development
Kali Linux is preinstalled with over 300 penetration-testing programs, including Armitage (a graphical cyber attack management tool), nmap (a port scanner), Wireshark (a packet analyzer), John the Ripper (a password cracker), Aircrack-ng (a software suite for penetration-testing wireless LANs), Burp suite and OWASP ZAP (both web application security scanners). Kali Linux can run natively when installed on a computer's hard disk, can be booted from a live CD or live USB, or it can run within a virtual machine. It is a supported platform of the Metasploit Project's Metasploit Framework, a tool for developing and executing security exploits.

It was developed by Mati Aharoni and Devon Kearns of Offensive Security through the rewrite of BackTrack, their previous forensics Linux distribution based on Ubuntu. The third core developer Raphaël Hertzog joined them as Debian expert.

Kali Linux is based on Debian Testing. Most packages Kali uses are imported from the Debian repositories.

Kali Linux is developed using a secure environment with only a small number of trusted people that are allowed to commit packages, with each package being signed by the developer. Kali also has a custom-built kernel that is patched for injection. This was primarily added because the development team found they needed to do a lot of wireless assessments.

Supported platforms
Kali Linux is distributed in 32-bit and 64-bit images for use on hosts based on the x86 instruction set and as an image for the ARM architecture for use on the BeagleBoard computer and on Samsung's ARM Chromebook.

The developers of Kali Linux aim to make Kali Linux available for ARM devices.

Kali Linux is already available for BeagleBone Black, HP Chromebook, CubieBoard 2, CuBox, CuBox-i, Raspberry Pi, EfikaMX, Odroid U2, Odroid XU, Odroid XU3, Samsung Chromebook, Utilite Pro, Galaxy Note 10.1, and SS808.

Features
Kali Linux has a dedicated project set-aside for compatibility and porting to specific Android devices, called Kali Linux NetHunter.

It is the first Open Source Android penetration testing platform for Nexus devices, created as a joint effort between the Kali community member “BinkyBear” and Offensive Security. It supports Wireless 802.11 frame injection, one-click MANA Evil Access Point setups, HID keyboard (Teensy like attacks), as well as Bad USB MITM attacks.

BackTrack (Kali's predecessor) contained a mode known as forensic mode. This capability was carried over to Kali via live boot. This mode is very popular for many reasons such as many Kali users already have a bootable Kali USB drive or CD, and this option makes it easy to apply Kali to a forensic job. There are however some changes to forensic mode over the regular operation of the system, such as forensic mode doesn't touch the hard drive or swap space and auto mounting is disabled. However, it is recommended by the developers that if Kali is going to be used for real world forensics that these things be tested in that environment.

Tools
Kali Linux includes many well known security tools, including:

Nmap
Aircrack-ng
Kismet
Wireshark
Metasploit Framework
Burp suite
John the Ripper
Social Engineering Toolkit
Airodump-ng
Popular culture
The logo of Kali Linux appears on the background in the TV series Mr. Robot (2015) in episode 5 of season one. The Kali Linux logo also appears again as wallpaper in scenes from episode 1, episode 9 and more prominently in the episode 6, season 2 of the same series, when it is used by two of the main characters, Angela and Darlene. The operating system is also shown to be downloaded and installed at episode 10 of season 2.
Most Other Famous Hacking Tools:
*BackTrack
*Security-focused operating system
*Metasploit Project
*Nmap
*BackBox
*OpenVAS
*Kismet (software)
*Aircrack-ng
*dSploit

No comments:

Post a Comment

Install Visual Studio 2015:   Updated: November 16, 2016 For the latest documentation on Visual Studio 2017, see Visual Studio 2017 Do...