AGENDA What is Operating System? What is Kali Linux? Why Kali Linux? Kali Linux Users The Difference Between Kali Linux and Ubuntu Kali Linux Tools
Basic Commands Lab Kahoot! AGENDA
Operating System Operating System (OS) is a program that is act an intermediary between a computer user and computer hardware . An operating system performs all the basic tasks like file management, memory management, process management, handling input and output, and controlling peripheral devices such as disk drives and printers.
What is Kali linux ?
What is Kali Linux ? Kali Linux is an operating system Debian -derived Linux distribution designed for digital forensics and penetration testing (ethical hacking). It is maintained and funded by Offensive Security
Why kali Linux ?
Why Kali Linux Kali Linux is made with pentesters and pentesting in mind so, expecting it to fit with your necessity might not be as simple even though it’s completely possible. If you are new to Linux or have less experience with command line you might find Kali Linux to be not so user-friendly, even though our developers try to make it as user-friendly as possible some things might be intimidating to you if you are new. If you are installing Kali Linux for the first time, it is recommended to install first in Virtual Machine then, after getting familiar with it, you can install it in your own hardware.
Why kali Linux
Why kali Linux
Features of kali Linux • More than 600 penetration testing tools included. • Free and always will be. • Open source Git tree. • Multi-language support. • FHS compliant ( Filesystem Hierarchy Standard ). • Available in a 32 bit and 64 bit. • Available as an image for various ARM architectures. etc. Raspberry pi. • Users can customize Kali Linux to suit their needs Filesystem Hierarchy Standard
Who Use K ali Linux Ethical Hacker Penetration Testing Forensics OTHER USERS
The Three Main Classes of Hackers
Ethical Hacker Ethical hacker (also known as a white-hat hacker) is the ultimate security professional. Ethical hackers know how to find and exploit vulnerabilities and weaknesses in various systems—just like a malicious hacker (or a black hat hacker). In fact, they both use the same skills; however, an ethical hacker uses those skills in a legitimate, lawful manner to try to find vulnerabilities and fix them before the bad guys can get there and try to break in.
What is Penetration Testing? Penetration testing , also called pen testing or ethical hacking, is the practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit. Penetration testing can be automated with software applications or performed manually.
Websites for Pen Testing https://bugbounty.sa/#/ https://bugcrowd.com/programs
Rewards may reach up to
Forensics is defined as the process of preservation, identification, extraction, and documentation of computer evidence which can be used by the court of law. It is a science of finding evidence from digital media like a computer , mobile phone, server, or network.
The Difference between Kali Linux and Ubuntu Kali Linux Ubuntu Primarily designed for purposes like Penetration Testing and Digital Forensics Designed to satisfy general Desktop and Server requirements and also targeted in some smart TV’s Developed by Offensive Security. And released on 13th March 2013. Developed by Canonical. And released back in 2004.
Useful tools in Kali Linux Nmap netdiscover Nikto Burpsuite hashcat
Terminal Terminal , also known as command lines or consoles, allow us to accomplish and automate tasks on a computer without the use of a graphical user interface (GUI).
Basic Commands Pwd: Prints the name of the present/current working directory. Cd: It is used to change current working directory. Ls: It is used to list the content of the directory Cd - : To change back to the previous working directory Mkdir: To create or make new directory.