kalilinux.pptxfgfgfdgfdgfdgfdgfdfgfgfgfgfg

zmulani8 40 views 26 slides Aug 01, 2024
Slide 1
Slide 1 of 26
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26

About This Presentation

fgdfg


Slide Content

Introduction to Kali linux .

AGENDA What is Operating System? What is Kali Linux? Why Kali Linux? Kali Linux Users The Difference Between Kali Linux and Ubuntu Kali Linux Tools

Basic Commands Lab Kahoot! AGENDA

Operating System Operating System (OS) is a program that is act an intermediary between a computer user and computer hardware . An operating system performs all the basic tasks like file management, memory management, process management, handling input and output, and controlling peripheral devices such as disk drives and printers.

What is Kali linux ?

What is Kali Linux ? Kali Linux is an operating system Debian -derived Linux distribution designed for digital forensics and penetration testing (ethical hacking). It is maintained and funded by Offensive Security

Why kali Linux ?

Why Kali Linux Kali Linux is made with pentesters and pentesting in mind so, expecting it to fit with your necessity might not be as simple even though it’s completely possible. If you are new to Linux or have less experience with command line you might find Kali Linux to be not so user-friendly, even though our developers try to make it as user-friendly as possible some things might be intimidating to you if you are new. If you are installing Kali Linux for the first time, it is recommended to install first in Virtual Machine then, after getting familiar with it, you can install it in your own hardware.

Why kali Linux

Why kali Linux

Features of kali Linux • More than 600 penetration testing tools included. • Free and always will be. • Open source Git tree. • Multi-language support. • FHS compliant ( Filesystem Hierarchy Standard ). • Available in a 32 bit and 64 bit. • Available as an image for various ARM architectures. etc. Raspberry pi. • Users can customize Kali Linux to suit their needs Filesystem Hierarchy Standard

Who Use K ali Linux Ethical Hacker Penetration Testing Forensics OTHER USERS

The Three Main Classes of Hackers

Ethical Hacker Ethical hacker (also known as a white-hat hacker) is the ultimate security professional. Ethical hackers know how to find and exploit vulnerabilities and weaknesses in various systems—just like a malicious hacker (or a black hat hacker). In fact, they both use the same skills; however, an ethical hacker uses those skills in a legitimate, lawful manner to try to find vulnerabilities and fix them before the bad guys can get there and try to break in.

What is Penetration Testing? Penetration testing , also called pen testing or ethical hacking, is the practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit. Penetration testing can be automated with software applications or performed manually.

Websites for Pen Testing https://bugbounty.sa/#/ https://bugcrowd.com/programs

Rewards may reach up to

Forensics is defined as the process of preservation, identification, extraction, and documentation of computer evidence which can be used by the court of law. It is a science of finding evidence from digital media like a computer , mobile phone, server, or network.

The Difference between Kali Linux and Ubuntu Kali Linux Ubuntu Primarily designed for purposes like Penetration Testing and Digital Forensics Designed to satisfy general Desktop and Server requirements and also targeted in some smart TV’s Developed by Offensive Security. And released on 13th March 2013. Developed by Canonical. And released back in 2004.

Useful tools in Kali Linux Nmap netdiscover Nikto Burpsuite hashcat

Terminal Terminal , also known as command lines or consoles, allow us to accomplish and automate tasks on a computer without the use of a graphical user interface (GUI).

Basic Commands Pwd: Prints the name of the present/current working directory. Cd: It is used to change current working directory. Ls: It is used to list the content of the directory Cd - : To change back to the previous working directory Mkdir: To create or make new directory.

LAB Part

Let's do it !

Let’s play Kahoot!