SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Presented By:-
Malode Anirudh N.
Gaikwad Milind B.
Hanwate Avinash M.
Guided By:-
Prof. Mrs J. M. Waghmare
A
SEMINAR ON
CONTENTS
 Introduction
 History
 Features
 Kali’s New Features
 Scheduling policy
 Pro’s & Con’s
 Applications
 Conclusion
 References
INTRODUCTION
 Kali Linux is an advanced Penetration Testing and Security Auditing Linux
distribution (distro).
 Named after a Hindu goddess.
 It was designed to replace the BackTrack 6 Linux distro.
 Developed by Mati Aharoni (muts), Devon Kearns (dookie) and,
Raphaël Hertzog (bux) of Offensive Security.
 UNIX > Linux > BackTrack > Kali.
HISTORY
• 1968: E.W Dijkstra develops MULTICS (Multiplexed Information
and Computing Service) in the Netherlands
• 1969: Bell telephone (AT&T) lab researcher Ken Thompson
developed a new system using MULTICS as part of a team. His
coworker Brian Kernighan dubbed it UNICS (UNiplexed
Information and Computing Service). It was later changed to UNIX.
• Milestone: The UNIX operating system was born.
HISTORY
 1969-1973: Bell Telephone researcher Dennis Richie develops the C
language as a systems programming language for UNIX.
 1987: A Unix-like system based on microkernel design known as
MINIX was developed.
 Milestone: C language developed.
HISTORY
 1991:Linus Torvalds developed a new operating system called Linux, which
is similar to MINIX.
• 1990s-Today: Various UNIX and UNIX/Linux-like distributions are
released, such as: GNU, OS X, Debian, and Ubuntu.
• Milestone: Linux was born.
HISTORY
• 2006: Linux distribution BackTrack was released by Offensive Security. It
becomes the definitive Penetration Testing platform available.
• First version of Kali 1.0.0 was Released on 13th March, 2013.
• Latest version Kali 2.0 was released on 11th August, 2015.
• Milestones: BackTrack is born, then Kali.
FEATURES
• It is freely available.
• 300+ applications, from password crackers to digital forensics software.
• Vast wireless device support (ARM processors).
• Completely Customizable.
• Multilingual Support.
• Secure Development Environment.
• Follows File system Hierarchy Standard (FHS).
SCHEDULING POLICIES
 Multilevel Queue Scheduler :
 Each queue associated with a priority.
 A process’s priority may be adjusted dynamically.
Two classes of processes :
1. Real-time processes
 always schedule highest priority processes
 FCFS (SCHED_FIFO) or RR (SCHED_RR) for
processes with same priority.
2. Normal processes ( priority with aging )
 RR for processes with same priority (SCHED_NORMAL)
 Aging is implemented efficiently.
PRIORITIES IN SCHEDULING
• 140 separate queues, one for each priority level
• Actually, two sets, active and expired
• Priorities 0-99 for real-time processes
• Priorities 100-139 for normal processes; value set via nice() system call
SCHEDULING CLASSES
• SCHED_FIFO: A First-In, First-Out real-time process. When the
scheduler assigns the CPU to the process, it leaves the process
descriptor in its current position in the run queue list. If no other
higher-priority real-time process is runnable, the process continues to
use the CPU as long as it wishes, even if other real-time processes that
have the same priority are runnable.
• SCHED_RR: Round Robin real-time process. When the scheduler
assigns the CPU to the process, it puts the process descriptor at the end
of the run queue list. This policy ensures a fair assignment of CPU time
to all SCHED_RR real-time processes that have the same priority.
• SCHED_NORMAL: A conventional, time-shared process
EXAMPLE
• Scenario: 2 programs: text editor and compiler are being executed.
• Text editor is an interactive program, so it has a higher dynamic priority
than the compiler. Nevertheless, it is often suspended, because the user
alternates between pauses for think time and data entry. The average delay
between two key presses is relatively long. However, as soon as the user
presses a key, an interrupt is raised and the kernel wakes up the text editor
process.
EXAMPLE (CONT.)
• The kernel determines that the dynamic priority of the editor is higher than
the priority of current, the currently running process (the compiler), so it
sets the TIF_NEED_RESCHED flag of this process, thus forcing the
scheduler to be activated when the kernel finishes handling the interrupt.
• The scheduler selects the editor and performs a process switch; as a result,
the execution of the editor is resumed very quickly and the character typed
by the user is echoed to the screen. When the character has been
processed, the text editor process suspends itself waiting for another key
press and the compiler process can resume its execution.
KALI’S NEW FEATURES
• Follows FHS and Debian .
• Switched from Ubuntu to Debian.
• Can now bootstrap and customize Kali ISOs.
• Streaming security and package updates from Debian.
• Expanded ARM development.
• Easy upgrade to future versions.
• Long Term Tool Packaging and Maintenance.
PRO’S & CON’S
• PRO’s:
1. With many Linux distros, you have access to free software which numbers in the
thousands!
2. Kali Linux is less vulnerable to computer malware!
3. Kali Linux is very stable!
• Con’s:
1. Many windows programs will not run in Kali linux.
2. There is a smaller selection of peripheral hardware drivers for Kali linux.
3. There is a learning curve for people who are new to Kali linux.
APPLICATIONS
• Kali Linux is preinstalled with various penetration Testing programs
• nmap - port scanning, service and OS fingerprinting
• Wireshark - a packet analyzer.
• John The Ripper - a password cracker.
• Aircrack-ng – a software suite for penetration testing of wireless LANs.
• Hydra - Brute force password cracking tool.
• Maltego - Information on visualization & relationship analysis tool.
• Metasloit - Framework for developing and executing exploits.
• Sqlmap – Finds SQL injection flaws for taking over of database servers.
KALI’S TOOLKIT (300+!)
• Metasploit
• Nmap
• Wireshark
• Aircrack-ng
• John the Ripper
• CaseFile
• THC-Hydra
• Arduino
• diStorm3
• Sqlninja
• Proxy Strike
• Ghost Phisher
• CryptCat
• WebScarab
• Android-sdk
• Maskprocessor
• SIPArmyKnife
• FERN Wi-Fi Cracker
CONCLUSION
• Kali is the premier operating system for Penetration Testing and other
related uses.
• Kali was built from the ground up to replace BackTrack.
• There are many platforms and installation methods that are Kali-
compatible.
REFERENCES
• http://www.kali.org
• http://www.offensive-security.com/
• Wikipedia. "BackTrack." Wikipedia. Wikimedia Foundation, 23 Sept.
2014. Web. 23 Sept. 2014.
• Aharoni, Mati. "Kali Linux | Rebirth of BackTrack, the Penetration
Testing Distribution." Kali Linux. Offensive Security, 25 Aug. 2014.
Web. 23 Sept. 2014.
• “Backtrack vs Kali." Diffen.com. Diffen LLC, n.d. Web. 23 Sep 2014.
Thank You!!!

Weitere ähnliche Inhalte

Was ist angesagt?

Xen in Safety-Critical Systems - Critical Summit 2022
Xen in Safety-Critical Systems - Critical Summit 2022Xen in Safety-Critical Systems - Critical Summit 2022
Xen in Safety-Critical Systems - Critical Summit 2022Stefano Stabellini
 
Software testing methods, levels and types
Software testing methods, levels and typesSoftware testing methods, levels and types
Software testing methods, levels and typesConfiz
 
Slicing and testing
Slicing and testingSlicing and testing
Slicing and testingTaegeonLee1
 
Linux Tutorial For Beginners | Linux Administration Tutorial | Linux Commands...
Linux Tutorial For Beginners | Linux Administration Tutorial | Linux Commands...Linux Tutorial For Beginners | Linux Administration Tutorial | Linux Commands...
Linux Tutorial For Beginners | Linux Administration Tutorial | Linux Commands...Edureka!
 
Principles of Software testing
Principles of Software testingPrinciples of Software testing
Principles of Software testingMd Mamunur Rashid
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
Operating system architecture
Operating system architectureOperating system architecture
Operating system architectureSabin dumre
 
Testing Software
Testing SoftwareTesting Software
Testing Softwareodelorenzi
 
penetration test using Kali linux seminar report
penetration test using Kali linux seminar reportpenetration test using Kali linux seminar report
penetration test using Kali linux seminar reportAbhayNaik8
 

Was ist angesagt? (20)

Kali linux
Kali linuxKali linux
Kali linux
 
Xen in Safety-Critical Systems - Critical Summit 2022
Xen in Safety-Critical Systems - Critical Summit 2022Xen in Safety-Critical Systems - Critical Summit 2022
Xen in Safety-Critical Systems - Critical Summit 2022
 
Kali presentation
Kali presentationKali presentation
Kali presentation
 
Linux file system
Linux file systemLinux file system
Linux file system
 
Kali Linux
Kali LinuxKali Linux
Kali Linux
 
Software testing methods, levels and types
Software testing methods, levels and typesSoftware testing methods, levels and types
Software testing methods, levels and types
 
Kali Linux
Kali LinuxKali Linux
Kali Linux
 
Kali linux os
Kali linux osKali linux os
Kali linux os
 
Basic Linux Internals
Basic Linux InternalsBasic Linux Internals
Basic Linux Internals
 
Slicing and testing
Slicing and testingSlicing and testing
Slicing and testing
 
Linux Tutorial For Beginners | Linux Administration Tutorial | Linux Commands...
Linux Tutorial For Beginners | Linux Administration Tutorial | Linux Commands...Linux Tutorial For Beginners | Linux Administration Tutorial | Linux Commands...
Linux Tutorial For Beginners | Linux Administration Tutorial | Linux Commands...
 
Linux introduction
Linux introductionLinux introduction
Linux introduction
 
Principles of Software testing
Principles of Software testingPrinciples of Software testing
Principles of Software testing
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
A History of Linux
A History of LinuxA History of Linux
A History of Linux
 
Operating system architecture
Operating system architectureOperating system architecture
Operating system architecture
 
Linux systems - Linux Commands and Shell Scripting
Linux systems - Linux Commands and Shell ScriptingLinux systems - Linux Commands and Shell Scripting
Linux systems - Linux Commands and Shell Scripting
 
Testing Software
Testing SoftwareTesting Software
Testing Software
 
penetration test using Kali linux seminar report
penetration test using Kali linux seminar reportpenetration test using Kali linux seminar report
penetration test using Kali linux seminar report
 
White Box Testing
White Box Testing White Box Testing
White Box Testing
 

Ähnlich wie kali linux

Gnu linux for safety related systems
Gnu linux for safety related systemsGnu linux for safety related systems
Gnu linux for safety related systemsDTQ4
 
Nomura UCCSC 2009
Nomura UCCSC 2009Nomura UCCSC 2009
Nomura UCCSC 2009dnomura
 
Linux Kernel Security Overview - KCA 2009
Linux Kernel Security Overview - KCA 2009Linux Kernel Security Overview - KCA 2009
Linux Kernel Security Overview - KCA 2009James Morris
 
Performance analysis and troubleshooting using DTrace
Performance analysis and troubleshooting using DTracePerformance analysis and troubleshooting using DTrace
Performance analysis and troubleshooting using DTraceGraeme Jenkinson
 
Linux for embedded_systems
Linux for embedded_systemsLinux for embedded_systems
Linux for embedded_systemsVandana Salve
 
Exokernel Operating System (1)
Exokernel Operating System (1)Exokernel Operating System (1)
Exokernel Operating System (1)Kashif Dayo
 
DCSF19 Container Security: Theory & Practice at Netflix
DCSF19 Container Security: Theory & Practice at NetflixDCSF19 Container Security: Theory & Practice at Netflix
DCSF19 Container Security: Theory & Practice at NetflixDocker, Inc.
 
UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...
UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...
UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...Vincent Giersch
 
2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)Mike Svoboda
 
F9: A Secure and Efficient Microkernel Built for Deeply Embedded Systems
F9: A Secure and Efficient Microkernel Built for Deeply Embedded SystemsF9: A Secure and Efficient Microkernel Built for Deeply Embedded Systems
F9: A Secure and Efficient Microkernel Built for Deeply Embedded SystemsNational Cheng Kung University
 
Infosecurity.be 2019: What are relevant open source security tools you should...
Infosecurity.be 2019: What are relevant open source security tools you should...Infosecurity.be 2019: What are relevant open source security tools you should...
Infosecurity.be 2019: What are relevant open source security tools you should...B.A.
 
how-to-bypass-AM-PPL
how-to-bypass-AM-PPLhow-to-bypass-AM-PPL
how-to-bypass-AM-PPLnitinscribd
 
RIoT (Raiding Internet of Things) by Jacob Holcomb
RIoT  (Raiding Internet of Things)  by Jacob HolcombRIoT  (Raiding Internet of Things)  by Jacob Holcomb
RIoT (Raiding Internet of Things) by Jacob HolcombPriyanka Aash
 
25 years of firewalls and network filtering - From antiquity to the cloud
25 years of firewalls and network filtering - From antiquity to the cloud25 years of firewalls and network filtering - From antiquity to the cloud
25 years of firewalls and network filtering - From antiquity to the cloudshira koper
 

Ähnlich wie kali linux (20)

Kali linux
Kali linuxKali linux
Kali linux
 
Gnu linux for safety related systems
Gnu linux for safety related systemsGnu linux for safety related systems
Gnu linux for safety related systems
 
Nomura UCCSC 2009
Nomura UCCSC 2009Nomura UCCSC 2009
Nomura UCCSC 2009
 
Amazon Deep Learning
Amazon Deep LearningAmazon Deep Learning
Amazon Deep Learning
 
Linux Kernel Security Overview - KCA 2009
Linux Kernel Security Overview - KCA 2009Linux Kernel Security Overview - KCA 2009
Linux Kernel Security Overview - KCA 2009
 
Performance analysis and troubleshooting using DTrace
Performance analysis and troubleshooting using DTracePerformance analysis and troubleshooting using DTrace
Performance analysis and troubleshooting using DTrace
 
Linux for embedded_systems
Linux for embedded_systemsLinux for embedded_systems
Linux for embedded_systems
 
RT linux
RT linuxRT linux
RT linux
 
Exokernel Operating System (1)
Exokernel Operating System (1)Exokernel Operating System (1)
Exokernel Operating System (1)
 
DCSF19 Container Security: Theory & Practice at Netflix
DCSF19 Container Security: Theory & Practice at NetflixDCSF19 Container Security: Theory & Practice at Netflix
DCSF19 Container Security: Theory & Practice at Netflix
 
UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...
UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...
UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...
 
Linux
LinuxLinux
Linux
 
2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)
 
Construct an Efficient and Secure Microkernel for IoT
Construct an Efficient and Secure Microkernel for IoTConstruct an Efficient and Secure Microkernel for IoT
Construct an Efficient and Secure Microkernel for IoT
 
F9: A Secure and Efficient Microkernel Built for Deeply Embedded Systems
F9: A Secure and Efficient Microkernel Built for Deeply Embedded SystemsF9: A Secure and Efficient Microkernel Built for Deeply Embedded Systems
F9: A Secure and Efficient Microkernel Built for Deeply Embedded Systems
 
Infosecurity.be 2019: What are relevant open source security tools you should...
Infosecurity.be 2019: What are relevant open source security tools you should...Infosecurity.be 2019: What are relevant open source security tools you should...
Infosecurity.be 2019: What are relevant open source security tools you should...
 
how-to-bypass-AM-PPL
how-to-bypass-AM-PPLhow-to-bypass-AM-PPL
how-to-bypass-AM-PPL
 
RIoT (Raiding Internet of Things) by Jacob Holcomb
RIoT  (Raiding Internet of Things)  by Jacob HolcombRIoT  (Raiding Internet of Things)  by Jacob Holcomb
RIoT (Raiding Internet of Things) by Jacob Holcomb
 
Os file
Os fileOs file
Os file
 
25 years of firewalls and network filtering - From antiquity to the cloud
25 years of firewalls and network filtering - From antiquity to the cloud25 years of firewalls and network filtering - From antiquity to the cloud
25 years of firewalls and network filtering - From antiquity to the cloud
 

Kürzlich hochgeladen

Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 

Kürzlich hochgeladen (20)

Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 

kali linux

  • 1. Presented By:- Malode Anirudh N. Gaikwad Milind B. Hanwate Avinash M. Guided By:- Prof. Mrs J. M. Waghmare A SEMINAR ON
  • 2. CONTENTS  Introduction  History  Features  Kali’s New Features  Scheduling policy  Pro’s & Con’s  Applications  Conclusion  References
  • 3. INTRODUCTION  Kali Linux is an advanced Penetration Testing and Security Auditing Linux distribution (distro).  Named after a Hindu goddess.  It was designed to replace the BackTrack 6 Linux distro.  Developed by Mati Aharoni (muts), Devon Kearns (dookie) and, Raphaël Hertzog (bux) of Offensive Security.  UNIX > Linux > BackTrack > Kali.
  • 4. HISTORY • 1968: E.W Dijkstra develops MULTICS (Multiplexed Information and Computing Service) in the Netherlands • 1969: Bell telephone (AT&T) lab researcher Ken Thompson developed a new system using MULTICS as part of a team. His coworker Brian Kernighan dubbed it UNICS (UNiplexed Information and Computing Service). It was later changed to UNIX. • Milestone: The UNIX operating system was born.
  • 5. HISTORY  1969-1973: Bell Telephone researcher Dennis Richie develops the C language as a systems programming language for UNIX.  1987: A Unix-like system based on microkernel design known as MINIX was developed.  Milestone: C language developed.
  • 6. HISTORY  1991:Linus Torvalds developed a new operating system called Linux, which is similar to MINIX. • 1990s-Today: Various UNIX and UNIX/Linux-like distributions are released, such as: GNU, OS X, Debian, and Ubuntu. • Milestone: Linux was born.
  • 7. HISTORY • 2006: Linux distribution BackTrack was released by Offensive Security. It becomes the definitive Penetration Testing platform available. • First version of Kali 1.0.0 was Released on 13th March, 2013. • Latest version Kali 2.0 was released on 11th August, 2015. • Milestones: BackTrack is born, then Kali.
  • 8. FEATURES • It is freely available. • 300+ applications, from password crackers to digital forensics software. • Vast wireless device support (ARM processors). • Completely Customizable. • Multilingual Support. • Secure Development Environment. • Follows File system Hierarchy Standard (FHS).
  • 9. SCHEDULING POLICIES  Multilevel Queue Scheduler :  Each queue associated with a priority.  A process’s priority may be adjusted dynamically. Two classes of processes : 1. Real-time processes  always schedule highest priority processes  FCFS (SCHED_FIFO) or RR (SCHED_RR) for processes with same priority. 2. Normal processes ( priority with aging )  RR for processes with same priority (SCHED_NORMAL)  Aging is implemented efficiently.
  • 10. PRIORITIES IN SCHEDULING • 140 separate queues, one for each priority level • Actually, two sets, active and expired • Priorities 0-99 for real-time processes • Priorities 100-139 for normal processes; value set via nice() system call
  • 11. SCHEDULING CLASSES • SCHED_FIFO: A First-In, First-Out real-time process. When the scheduler assigns the CPU to the process, it leaves the process descriptor in its current position in the run queue list. If no other higher-priority real-time process is runnable, the process continues to use the CPU as long as it wishes, even if other real-time processes that have the same priority are runnable.
  • 12. • SCHED_RR: Round Robin real-time process. When the scheduler assigns the CPU to the process, it puts the process descriptor at the end of the run queue list. This policy ensures a fair assignment of CPU time to all SCHED_RR real-time processes that have the same priority. • SCHED_NORMAL: A conventional, time-shared process
  • 13. EXAMPLE • Scenario: 2 programs: text editor and compiler are being executed. • Text editor is an interactive program, so it has a higher dynamic priority than the compiler. Nevertheless, it is often suspended, because the user alternates between pauses for think time and data entry. The average delay between two key presses is relatively long. However, as soon as the user presses a key, an interrupt is raised and the kernel wakes up the text editor process.
  • 14. EXAMPLE (CONT.) • The kernel determines that the dynamic priority of the editor is higher than the priority of current, the currently running process (the compiler), so it sets the TIF_NEED_RESCHED flag of this process, thus forcing the scheduler to be activated when the kernel finishes handling the interrupt. • The scheduler selects the editor and performs a process switch; as a result, the execution of the editor is resumed very quickly and the character typed by the user is echoed to the screen. When the character has been processed, the text editor process suspends itself waiting for another key press and the compiler process can resume its execution.
  • 15. KALI’S NEW FEATURES • Follows FHS and Debian . • Switched from Ubuntu to Debian. • Can now bootstrap and customize Kali ISOs. • Streaming security and package updates from Debian. • Expanded ARM development. • Easy upgrade to future versions. • Long Term Tool Packaging and Maintenance.
  • 16. PRO’S & CON’S • PRO’s: 1. With many Linux distros, you have access to free software which numbers in the thousands! 2. Kali Linux is less vulnerable to computer malware! 3. Kali Linux is very stable! • Con’s: 1. Many windows programs will not run in Kali linux. 2. There is a smaller selection of peripheral hardware drivers for Kali linux. 3. There is a learning curve for people who are new to Kali linux.
  • 17. APPLICATIONS • Kali Linux is preinstalled with various penetration Testing programs • nmap - port scanning, service and OS fingerprinting • Wireshark - a packet analyzer. • John The Ripper - a password cracker. • Aircrack-ng – a software suite for penetration testing of wireless LANs. • Hydra - Brute force password cracking tool. • Maltego - Information on visualization & relationship analysis tool. • Metasloit - Framework for developing and executing exploits. • Sqlmap – Finds SQL injection flaws for taking over of database servers.
  • 18. KALI’S TOOLKIT (300+!) • Metasploit • Nmap • Wireshark • Aircrack-ng • John the Ripper • CaseFile • THC-Hydra • Arduino • diStorm3 • Sqlninja • Proxy Strike • Ghost Phisher • CryptCat • WebScarab • Android-sdk • Maskprocessor • SIPArmyKnife • FERN Wi-Fi Cracker
  • 19. CONCLUSION • Kali is the premier operating system for Penetration Testing and other related uses. • Kali was built from the ground up to replace BackTrack. • There are many platforms and installation methods that are Kali- compatible.
  • 20. REFERENCES • http://www.kali.org • http://www.offensive-security.com/ • Wikipedia. "BackTrack." Wikipedia. Wikimedia Foundation, 23 Sept. 2014. Web. 23 Sept. 2014. • Aharoni, Mati. "Kali Linux | Rebirth of BackTrack, the Penetration Testing Distribution." Kali Linux. Offensive Security, 25 Aug. 2014. Web. 23 Sept. 2014. • “Backtrack vs Kali." Diffen.com. Diffen LLC, n.d. Web. 23 Sep 2014.