Kali Linux is an advanced Penetration Testing and Security Auditing Linux distribution (distro).
Named after a Hindu goddess.
It was designed to replace the BackTrack 6 Linux distro.
Developed by Mati Aharoni (muts), Devon Kearns (dookie) and, Raphaël Hertzog (bux) of Offensive Security.
UNIX > Linux > BackTrack > Kali.
1. Presented By:-
Malode Anirudh N.
Gaikwad Milind B.
Hanwate Avinash M.
Guided By:-
Prof. Mrs J. M. Waghmare
A
SEMINAR ON
2. CONTENTS
Introduction
History
Features
Kali’s New Features
Scheduling policy
Pro’s & Con’s
Applications
Conclusion
References
3. INTRODUCTION
Kali Linux is an advanced Penetration Testing and Security Auditing Linux
distribution (distro).
Named after a Hindu goddess.
It was designed to replace the BackTrack 6 Linux distro.
Developed by Mati Aharoni (muts), Devon Kearns (dookie) and,
Raphaël Hertzog (bux) of Offensive Security.
UNIX > Linux > BackTrack > Kali.
4. HISTORY
• 1968: E.W Dijkstra develops MULTICS (Multiplexed Information
and Computing Service) in the Netherlands
• 1969: Bell telephone (AT&T) lab researcher Ken Thompson
developed a new system using MULTICS as part of a team. His
coworker Brian Kernighan dubbed it UNICS (UNiplexed
Information and Computing Service). It was later changed to UNIX.
• Milestone: The UNIX operating system was born.
5. HISTORY
1969-1973: Bell Telephone researcher Dennis Richie develops the C
language as a systems programming language for UNIX.
1987: A Unix-like system based on microkernel design known as
MINIX was developed.
Milestone: C language developed.
6. HISTORY
1991:Linus Torvalds developed a new operating system called Linux, which
is similar to MINIX.
• 1990s-Today: Various UNIX and UNIX/Linux-like distributions are
released, such as: GNU, OS X, Debian, and Ubuntu.
• Milestone: Linux was born.
7. HISTORY
• 2006: Linux distribution BackTrack was released by Offensive Security. It
becomes the definitive Penetration Testing platform available.
• First version of Kali 1.0.0 was Released on 13th March, 2013.
• Latest version Kali 2.0 was released on 11th August, 2015.
• Milestones: BackTrack is born, then Kali.
8. FEATURES
• It is freely available.
• 300+ applications, from password crackers to digital forensics software.
• Vast wireless device support (ARM processors).
• Completely Customizable.
• Multilingual Support.
• Secure Development Environment.
• Follows File system Hierarchy Standard (FHS).
9. SCHEDULING POLICIES
Multilevel Queue Scheduler :
Each queue associated with a priority.
A process’s priority may be adjusted dynamically.
Two classes of processes :
1. Real-time processes
always schedule highest priority processes
FCFS (SCHED_FIFO) or RR (SCHED_RR) for
processes with same priority.
2. Normal processes ( priority with aging )
RR for processes with same priority (SCHED_NORMAL)
Aging is implemented efficiently.
10. PRIORITIES IN SCHEDULING
• 140 separate queues, one for each priority level
• Actually, two sets, active and expired
• Priorities 0-99 for real-time processes
• Priorities 100-139 for normal processes; value set via nice() system call
11. SCHEDULING CLASSES
• SCHED_FIFO: A First-In, First-Out real-time process. When the
scheduler assigns the CPU to the process, it leaves the process
descriptor in its current position in the run queue list. If no other
higher-priority real-time process is runnable, the process continues to
use the CPU as long as it wishes, even if other real-time processes that
have the same priority are runnable.
12. • SCHED_RR: Round Robin real-time process. When the scheduler
assigns the CPU to the process, it puts the process descriptor at the end
of the run queue list. This policy ensures a fair assignment of CPU time
to all SCHED_RR real-time processes that have the same priority.
• SCHED_NORMAL: A conventional, time-shared process
13. EXAMPLE
• Scenario: 2 programs: text editor and compiler are being executed.
• Text editor is an interactive program, so it has a higher dynamic priority
than the compiler. Nevertheless, it is often suspended, because the user
alternates between pauses for think time and data entry. The average delay
between two key presses is relatively long. However, as soon as the user
presses a key, an interrupt is raised and the kernel wakes up the text editor
process.
14. EXAMPLE (CONT.)
• The kernel determines that the dynamic priority of the editor is higher than
the priority of current, the currently running process (the compiler), so it
sets the TIF_NEED_RESCHED flag of this process, thus forcing the
scheduler to be activated when the kernel finishes handling the interrupt.
• The scheduler selects the editor and performs a process switch; as a result,
the execution of the editor is resumed very quickly and the character typed
by the user is echoed to the screen. When the character has been
processed, the text editor process suspends itself waiting for another key
press and the compiler process can resume its execution.
15. KALI’S NEW FEATURES
• Follows FHS and Debian .
• Switched from Ubuntu to Debian.
• Can now bootstrap and customize Kali ISOs.
• Streaming security and package updates from Debian.
• Expanded ARM development.
• Easy upgrade to future versions.
• Long Term Tool Packaging and Maintenance.
16. PRO’S & CON’S
• PRO’s:
1. With many Linux distros, you have access to free software which numbers in the
thousands!
2. Kali Linux is less vulnerable to computer malware!
3. Kali Linux is very stable!
• Con’s:
1. Many windows programs will not run in Kali linux.
2. There is a smaller selection of peripheral hardware drivers for Kali linux.
3. There is a learning curve for people who are new to Kali linux.
17. APPLICATIONS
• Kali Linux is preinstalled with various penetration Testing programs
• nmap - port scanning, service and OS fingerprinting
• Wireshark - a packet analyzer.
• John The Ripper - a password cracker.
• Aircrack-ng – a software suite for penetration testing of wireless LANs.
• Hydra - Brute force password cracking tool.
• Maltego - Information on visualization & relationship analysis tool.
• Metasloit - Framework for developing and executing exploits.
• Sqlmap – Finds SQL injection flaws for taking over of database servers.
19. CONCLUSION
• Kali is the premier operating system for Penetration Testing and other
related uses.
• Kali was built from the ground up to replace BackTrack.
• There are many platforms and installation methods that are Kali-
compatible.
20. REFERENCES
• http://www.kali.org
• http://www.offensive-security.com/
• Wikipedia. "BackTrack." Wikipedia. Wikimedia Foundation, 23 Sept.
2014. Web. 23 Sept. 2014.
• Aharoni, Mati. "Kali Linux | Rebirth of BackTrack, the Penetration
Testing Distribution." Kali Linux. Offensive Security, 25 Aug. 2014.
Web. 23 Sept. 2014.
• “Backtrack vs Kali." Diffen.com. Diffen LLC, n.d. Web. 23 Sep 2014.