2. OPERATING SYSTEM
Topic
Kali Limoux Operating System
Class:
MITM-Part (2)
SUBITTED BY:
ISMAT SHAKOOR
SUBJECT:
Operating System
Submitted To:
SIR: Shahzad Jaffar
3. OPERATING SYSTEM
TABLE OF CONTENT page No
1. Acknowledgement 05
2. Introducation of kali Linux 06
2.0More than 600 penetration testing tools included 06
2.1Free (as in beer) and always will be 06
2.2Open source Git tree 06
2.3FHS compliant 06
2.4Wide-ranging wireless device support 06
2.5Wide-ranging wireless device support 06
2.6Custom kernel, patched for injection 06
2.7Developed in a secure environment 06.
2.8GPG signed packages and repositories 06
2.9Multi-language support 07
2.10Completely customizable 07
2.11ARMEL and ARMHF support 07
3.History of kali Linux 07
3.0What is the history of Kali Linux and Backtrack? 07
3.1So why bother changing the name? 08
4.How to Install Kali Linux step-by-Step Guide 08_16
5.Understanding the directory structure of kali Linux 017
5.0Root 017
5.1bin user binaries 017
5.2sbin system binaries 017
5.3etc Configuration File 017
5.4dev device file 017
5.5process information 018
5.6Variable file 018
5.7Temporary file 018
5.8User program 018
5.9Home directories 018
5.10Boot loader file 019
5.11System libraries 019
5.12Optional add on application 019
5.13Mount directory 019
5.14Removable media device 019
5. OPERATING SYSTEM
Acknowledgment "We have taken efforts in this project. This book would
have not been possible without the support and encouragement of our
Teacher. We are highly grateful to members of group for their guidance
and constant supervision as well as for providing necessary information
regarding the project & also for their support in completing the project.
If you would ever like any more information from us, please feel free to
call me or any member of my staff directly. Enclosed you will find
information cards should you know of anyone who may benefit from our
services of server room. I would like to say thanks to my friends for
helping me along with the production of this book. My thanks and
appreciations also go to my colleague in developing the project and
people who have willingly helped me out with their abilities." I would
like to take this opportunity to my teacher Prof. Shahzad jaffar whose
guidance and encouragement has enabled me to complete this project. I
learnt a lot of things from this project.
6. OPERATING SYSTEM
Kali Linux is a Debian-based Linux distribution aimed at advanced Penetration Testing
and Security Auditing. Kali contains several hundred tools aimed at various information
security tasks, such as Penetration Testing, Forensics and Reverse Engineering. Kali
Linux is developed, funded and maintained by offensive security , a leading information
security training company.
Kali Linux was released on the 13th March, 2013 as a complete, top-to-bottom rebuild
of back track security adhering completely to debain development standards.
More than 600 penetration testing tools included: After reviewing every
tool that was included in BackTrack, we eliminated a great number of tools that
either simply did not work or which duplicated other tools that provided the same or
similar functionality. Details on what’s included are on the kali toolssite.
Free (as in beer) and always will be: Kali Linux, like BackTrack, is
completely free of charge and always will be. You will never, ever have to pay for
Kali Linux.
Open source Git tree: We are committed to the open source development
model and our development tree is available for all to see. All of the
source code which goes into Kali Linux is available for anyone who wants to tweak
or rebuild packages to suit their specific needs.
FHS compliant: Kali adheres to the File System Hierarchy Standard, allowing
Linux users to easily locate binaries, support files, libraries, etc.
Wide-ranging wireless device support: A regular sticking point with Linux
distributions has been supported for wireless interfaces. We have built Kali Linux to
support as many wireless devices as we possibly can, allowing it to run properly on
a wide variety of hardware and making it compatible with numerous USB and other
wireless devices.
Custom kernel, patched for injection: As penetration testers, the
development team often needs to do wireless assessments, so our kernel has the
latest injection patches included.
Developed in a secure environment: The Kali Linux team is made up of a
small group of individuals who are the only ones trusted to commit packages and
interact with the repositories, all of which is done using multiple secure protocols.
7. OPERATING SYSTEM
GPG signed packages and repositories: Every package in Kali Linux
is signed by each individual developer who built and committed it, and the
repositories subsequently sign the packages as well.
Multi-language support: Although penetration tools tend to be written in
English, we have ensured that Kali includes true multilingual support, allowing more
users to operate in their native language and locate the tools they need for the job.
Completely customizable: We thoroughly understand that not everyone will
agree with our design decisions, so we have made it as easy as possible for our
more adventurous users to customize kali Linux to their liking, all the way down to
the kernel.
ARMEL and ARMHF support: Since ARM-based single-board systems like
the Raspberry Pi and BeagleBone Black, among others, are becoming more and
more prevalent and inexpensive, we knew that kali’s ARM support would need to be
as robust as we could manage, with fully working installations for both ARMEL and
ARMHF systems..
History ofkali Linux
Looks like Kali Linux is a great success. Kali Linux is the successor to BackTrack, the
much loved Linux Penetration Distro/ Operating System that is aimed at penetration
testers and security professionals. Before we dive into our brief review – we thought it
would be cool to give a brief history of how Kali Linux came to be.
What is the historyof Kali Linuxand Backtrack?
We are all very familiar with Backtrack, which has been around for the last seven
years – created and managed by Offensive Security, but what is the history of this
famous Linux penetration testing distribution?
Much like we trace our ancestors back to Africa, so we trace Kali Linux back to Knoppix!
Knoppix was (I think) one of the first ever bootable Live Linux Distro’s. Still in existence,
Knoppix is a classic distro with a loyal community. Over time the Knoppix project was
forked into WHoppix (yes the WH are meant to be capitalized) that was then re-forked
into WHAX. WHAX was then re-branded and streamlined into the BackTrack that we all
used. There is a common thread throughout these distros, (Knoppix, which became
WHoppix, and then WHAX and finally into BackTrack); that is that the lineage focused
on intrusion detection and digital forensics. BackTrack expanded the scope and allowed
for many more tools to be incorporated into the distro. In any event, BackTrack had a
long reign of almost seven years as the pentesters and hackers distro of choice.
However, as of March 2013 the venerated distro was decommissioned and replaced by
Kali Linux. Phew. Long story – but the bottom line is that Kali Linux is the result of a rich
and colorful history.
8. OPERATING SYSTEM
So why bother changing the name?
Kali Linux is so different that the fine folks over at Offensive Security thought that to
solve the ‘inherent problems’ of BackTrack the authors needed a complete re-write.
The main issue with BackTrack v1-v5 was that it was a headache for dependencies.
Here was the problem: too many pentesting tools embedded within BackTrack all
struggled to co-exist within the dependencies. Many pentesting and security tools
where not regularly updated by their creators so the result was that trying to update
the entire OS often caused conflicts and tools would simply stop working, crash or
even cause other tools to crash. A good example of this is Ettercap which was not
updated for a long time.
The solution was to rebuild the distro bottom-up by making Kali Debian based. Before
with BackTrack there was a /pentest/ folder, whereas now it is all updated and managed
by Debian packages.
Kali Linux has 300 tools which automatically work within the Kali ecosphere. Kali also
has been created with the clean “File system Hierarchy Standard” and offers vast plug
and play wireless support, with the only exception appearing to be broadcom.
How to Install Kali Linux 2.0 Sana in VMware Workstation Step-
by-Step Guide
17. OPERATING SYSTEM
1. / – Root
Every single file and directory starts from the root directory.
Only root user has write privilege under this directory.
Please note that /root is root user’s home directory, which is not same as /.
2. /bin – User Binaries
Contains binary executables.
Common Linux commands you need to use in single-user modes are located
under this directory.
Commands used by all the users of the system are located here.
For example: ps, ls, ping, grep, cp.
3. /sbin – System Binaries
Just like /bin, /sbin also contains binary executables.
But, the linux commands located under this directory are used typically by
system aministrator, for system maintenance purpose.
For example: iptables, reboot, fdisk, ifconfig, swapon
4. /etc – ConfigurationFiles
Contains configuration files required by all programs.
This also contains startup and shutdown shell scripts used to start/stop individual
programs.
For example: /etc/resolv.conf, /etc/logrotate.conf
5. /dev – DeviceFiles
Contains device files.
These include terminal devices, usb, or any device attached to the system.
For example: /dev/tty1, /dev/usbmon0
18. OPERATING SYSTEM
6. /proc – Process Information
Contains information about system process.
This is a pseudo filesystem contains information about running process. For
example: /proc/{pid} directory contains information about the process with that
particular pid.
This is a virtual filesystem with text information about system resources. For
example: /proc/uptime
7. /var – Variable Files
var stands for variable files.
Content of the files that are expected to grow can be found under this directory.
This includes — system log files (/var/log); packages and database files (/var/lib);
emails (/var/mail); print queues (/var/spool); lock files (/var/lock); temp files
needed across reboots (/var/tmp);
8. /tmp – Temporary Files
Directory that contains temporary files created by system and users.
Files under this directory are deleted when system is rebooted.
9. /usr – User Programs
Contains binaries, libraries, documentation, and source-code for second level
programs.
/usr/bin contains binary files for user programs. If you can’t find a user binary
under /bin, look under /usr/bin. For example: at, awk, cc, less, scp
/usr/sbin contains binary files for system administrators. If you can’t find a system
binary under /sbin, look under /usr/sbin. For example: atd, cron, sshd, useradd,
userdel
/user/lib contains libraries for /usr/bin and /usr/sbin
/user/local contains users programs that you install from source. For example,
when you install apache from source, it goes under /usr/local/apache2
10. /home – Home Directories
Home directories for all users to store their personal files.
For example: /home/john, /home/nikita
11. /boot – Boot Loader Files
Contains boot loader related files.
Kernel initrd, vmlinux, grub files are located under /boot
For example: initrd.img-2.6.32-24-generic, vmlinuz-2.6.32-24-generic
19. OPERATING SYSTEM
12. /lib – System Libraries
Contains library files that supports the binaries located under /bin and /sbin
Library filenames are either ld* or lib*.so.*
For example: ld-2.11.1.so, libncurses.so.5.7
13. /opt – Optionaladd-onApplications
opt stands for optional.
Contains add-on applications from individual vendors.
add-on applications should be installed under either /opt/ or /opt/ sub-directory.
14. /mnt – MountDirectory
Temporary mount directory where sysadminscan mountfilesystems.
15. /media – Removable Media Devices
Temporary mount directory for removable devices.
For examples, /media/cdrom for CD-ROM; /media/floppy for floppy drives;
/media/cdrecorder for CD writer
16. /srv – Service Data
srv stands for service.
Contains server specific services related data.
For example, /srv/cvs contains CVS related data.
20. OPERATING SYSTEM
Kali Linux Commands
Commands Function
aspell Spell Checker
Bg Send to background
break Exit from a loop
Builtin Run a shell builtin
cal Display a calendar
cd
Change
Directory
chown Change file owner and group
cp Copy one or more files to another location
date Display or change the date and time
dc Desk Calculator
diff Display the differences between two files
dircolors Colour setup for `ls’
exit Exit the shell
false Do nothing, unsuccessfully
format Format disks or tapes
groupdel Delete a group
history Command History
jobs List active jobs
man Help manual
times User and system times
write Send a message to another user
rename Rename files
rm Remove files
21. OPERATING SYSTEM
Conclusion
In this paper we have presented the Adaptive Domain Environment for Operating
Systems as a solution for sharing hardware resources amongst multiple operating
systems. We have presented its architecture and suggested an implementation method
for the ix86 using Linux as the base OS. We have also defined areas of applicability.
Although the implementation discussion has centered around on the ix86 using Linux,
the concepts presented may be extended to other architectures and other base
operating systems in order to provide the same capabilities.
Given the current state of the operating system market and the research field, Adios
may be used to provide a bridge between both fields and promote the development of
more flexible and cooperative operating systems. This would provide system
administrators and programmers with the flexibility needed to develop user-friendly
operating environments and applications that are not limited by the choice of a single
operating system.