SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Downloaden Sie, um offline zu lesen
WELCOME
O.S PROJECT BY OUR GROUP
GROUP MEMBERS {B/B1}
!NAME !ENROLLMENT
*AKSHAT MODI : 216230316135
*KARTIKEY BANJARA : 216230316129
*MEET DIXIT: 216230316136
*AVI PRAJAPATI : 216230316171
PROJECT TITEL {KALI LINUX}
•Kali Linux (formerly known as BackTrack Linux) is an open-
source, Debian-based Linux distribution aimed at
advanced Penetration Testing and Security Auditing.
KALI LINUX HISTORY
• Kali Linux is based on years of knowledge and experience of
building a pentestion testing Operating Systems, which has
spanned over multiple previous projects. During all these
project’s life-time, there has been only a few different developers,
as the team has always been small. As a result, Kali has been
years in the making and has come a long way.
• The first project was called Whoppix, which stood for White Hat
Knoppix. As can be inferred from the name, it was based on
Knoppix for the underlining OS. Whoppix had releases ranging
from v2.0 to v2.7.
• This made way for the next project, WHAX (or the long
hand, WhiteHat Slax). The name change was because the base OS
changed from Knoppix to Slax. WHAX started at v3, as a nod
towards it carrying on from Whoppix.
• There was a similar OS being produced at the same time, Auditor
Security Collection (often getting shorted to just Auditor), once
again using Knoppix, and efforts were combined (with WHAX) to
produce BackTrack. BackTrack was based on Slackware from v1
to v3, but switched to Ubuntu later on with v4 to v5.
KALI NETHUNTER HISTORY
• Kali NetHunter is a custom OS for Android devices. This takes Kali
Linux desktop and makes it mobile.
• Kali NetHunter is made up of three parts:
• (ROM)
• [App (and AppStore)]
• (Kali Chroot)
• Kali Net Hunter was first released in September 2014 with v1.0,
supporting just Nexus devices (5,7 and 10). There was a minor
release of Kali NetHunter v1.1 in January 2015, and at the same
time device support started to appear, such as OnePlus One and
Nexus 4.
• Kali Net Hunter v3 was the next major release in January 2016,
which was a complete Net Hunter app rewrite, allowing for more
control and actions to be performed from it, build scripts and
Android 5 and 6 support. Nexus 6 device also became supported.
• Kali Net Hunter then joined the rolling release with 2019.2
release in May 2019, where 13 devices where supported, with a
mixture of Android 4 to 9. From this point, Kali Net Hunter
matched the release points of Kali Linux, with each of them
adding more devices support, image and overall features.
WHAT IS KALI LINUX?
• Kali Linux (formerly known as BackTrack Linux) is an open-source, Debian-based
Linux distribution aimed at advanced Penetration Testing and Security
Auditing. It does this by providing common tools, configurations, and
automations which allows the user to focus on the task that needs to be
completed, not the surrounding activity.
• Kali Linux contains industry specific modifications as well as several hundred
tools targeted towards various Information Security tasks, such as Penetration
Testing, Security Research, Computer Forensics, Reverse Engineering,
Vulnerability Management and Red Team Testing.
• Kali Linux is a multi-platform solution, accessible and freely available to
information security professionals and hobbyists.
KALI LINUX FEATURES
• More than 600 penetration testing tools included: After reviewing every tool that was included
in BackTrack, we eliminated a great number of tools that either simply did not work or which
duplicated other tools that provided the same or similar functionality. Details on what’s included
are on the Kali Tools site.
• Free (as in beer) and always will be: Kali Linux, like BackTrack, is completely free of charge and
always will be. You will never, ever have to pay for Kali Linux.
• Open source Git tree: We are committed to the open source development model and
our development tree is available for all to see. All of the source code which goes into Kali Linux is
available for anyone who wants to tweak or rebuild packages to suit their specific needs.
• FHS compliant: Kali adheres to the Filesystem Hierarchy Standard, allowing Linux users to easily
locate binaries, support files, libraries, etc.
• Wide-ranging wireless device support: A regular sticking point with Linux distributions has been
support for wireless interfaces. We have built Kali Linux to support as many wireless devices as we
possibly can, allowing it to run properly on a wide variety of hardware and making it compatible
with numerous USB and other wireless devices.
• Custom kernel, patched for injection: As penetration testers, the
development team often needs to do wireless assessments, so our kernel has
the latest injection patches included.
• Developed in a secure environment: The Kali Linux team is made up of a
small group of individuals who are the only ones trusted to commit packages
and interact with the repositories, all of which is done using multiple secure
protocols.
• GPG signed packages and repositories: Every package in Kali Linux is signed by each
individual developer who built and committed it, and the repositories subsequently sign
the packages as well.
• Multi-language support: Although penetration tools tend to be written in English, we
have ensured that Kali includes true multilingual support, allowing more users to
operate in their native language and locate the tools they need for the job.
• Completely customizable: We thoroughly understand that not everyone will agree with
our design decisions, so we have made it as easy as possible for our more adventurous
users to customize Kali Linux to their liking, all the way down to the kernel.
•
• ARMEL and ARMHF support: Since ARM-based single-board
systems like the Raspberry Pi and {BeagleBone} Black, among
others, are becoming more and more prevalent and inexpensive,
we knew that Kali’s ARM support would need to be as robust as
we could manage, with fully working installations for both ARMEL
and ARMHF systems. Kali Linux is available on a wide range of
ARM devices and has ARM repositories integrated with the
mainline distribution so tools for ARM are updated in conjunction
with the rest of the distribution.
• For more features of Kali Linux, please see the following page: Kali
Linux Overview.
• Kali Linux is specifically tailored to the needs of penetration
testing professionals, and therefore all documentation on this site
assumes prior knowledge of, and familiarity with, the Linux
operating system in general.
WHAT’S DIFFERENT ABOUT KALI LINUX?
• Kali Linux is specifically geared to meet the requirements of professional penetration
testing and security auditing. To achieve this, several core changes have been
implemented in Kali Linux which reflect these needs:
1.Network services disabled by default: Kali Linux contains systemd hooks that disable network
services by default. These hooks allow us to install various services on Kali Linux, while ensuring
that our distribution remains secure by default, no matter what packages are installed. Additional
services such as Bluetooth are also blocklisted by default.
2.Custom Linux kernel: Kali Linux uses an upstream kernel, patched for wireless
injection.
3.A minimal and trusted set of repositories: given the aims and goals of Kali Linux, maintaining the
integrity of the system as a whole is absolutely key. With that goal in mind, the set of upstream
software sources which Kali uses is kept to an absolute minimum. Many new Kali users are tempted
to add additional repositories to their sources list, but doing so runs a very serious risk of breaking
your Kali Linux installation.
Thank you

Weitere ähnliche Inhalte

Ähnlich wie Operating system

Unleash the Power: How to Install Kali Linux With a Twist
Unleash the Power: How to Install Kali Linux With a TwistUnleash the Power: How to Install Kali Linux With a Twist
Unleash the Power: How to Install Kali Linux With a TwistFredReynolds2
 
Kali Linux-Operating System Presentation.pptx
Kali Linux-Operating System Presentation.pptxKali Linux-Operating System Presentation.pptx
Kali Linux-Operating System Presentation.pptxSumaiyaSinja1
 
Shamsa altayer 10bg kali linux
Shamsa altayer 10bg   kali linuxShamsa altayer 10bg   kali linux
Shamsa altayer 10bg kali linuxshamsaot
 
penetration test using Kali linux seminar report
penetration test using Kali linux seminar reportpenetration test using Kali linux seminar report
penetration test using Kali linux seminar reportAbhayNaik8
 
(03 2013) guide to kali linux
(03 2013)   guide to kali linux(03 2013)   guide to kali linux
(03 2013) guide to kali linuxjulius77
 
Kali Linux - Falconer - ISS 2014
Kali Linux - Falconer - ISS 2014Kali Linux - Falconer - ISS 2014
Kali Linux - Falconer - ISS 2014TGodfrey
 
Top 10 dev ops tools (1)
Top 10 dev ops tools (1)Top 10 dev ops tools (1)
Top 10 dev ops tools (1)yalini97
 
01 linux history overview
01 linux history overview01 linux history overview
01 linux history overviewShay Cohen
 

Ähnlich wie Operating system (20)

Kali Linux
Kali LinuxKali Linux
Kali Linux
 
kali linux
kali linuxkali linux
kali linux
 
Unleash the Power: How to Install Kali Linux With a Twist
Unleash the Power: How to Install Kali Linux With a TwistUnleash the Power: How to Install Kali Linux With a Twist
Unleash the Power: How to Install Kali Linux With a Twist
 
Kali linux
Kali linuxKali linux
Kali linux
 
Kali Linux
Kali LinuxKali Linux
Kali Linux
 
Kali Linux-Operating System Presentation.pptx
Kali Linux-Operating System Presentation.pptxKali Linux-Operating System Presentation.pptx
Kali Linux-Operating System Presentation.pptx
 
Shamsa altayer 10bg kali linux
Shamsa altayer 10bg   kali linuxShamsa altayer 10bg   kali linux
Shamsa altayer 10bg kali linux
 
Kali linux 2021.2
Kali linux 2021.2Kali linux 2021.2
Kali linux 2021.2
 
penetration test using Kali linux seminar report
penetration test using Kali linux seminar reportpenetration test using Kali linux seminar report
penetration test using Kali linux seminar report
 
(03 2013) guide to kali linux
(03 2013)   guide to kali linux(03 2013)   guide to kali linux
(03 2013) guide to kali linux
 
Kali linux
Kali linuxKali linux
Kali linux
 
Kali Linux
Kali Linux Kali Linux
Kali Linux
 
Kali Linux - Falconer - ISS 2014
Kali Linux - Falconer - ISS 2014Kali Linux - Falconer - ISS 2014
Kali Linux - Falconer - ISS 2014
 
Kali linux
Kali linuxKali linux
Kali linux
 
Kalilinux
KalilinuxKalilinux
Kalilinux
 
Kali linux.ppt
Kali linux.pptKali linux.ppt
Kali linux.ppt
 
linux.pptx
linux.pptxlinux.pptx
linux.pptx
 
Top 10 dev ops tools (1)
Top 10 dev ops tools (1)Top 10 dev ops tools (1)
Top 10 dev ops tools (1)
 
Kal i linux
Kal i linuxKal i linux
Kal i linux
 
01 linux history overview
01 linux history overview01 linux history overview
01 linux history overview
 

Kürzlich hochgeladen

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Kürzlich hochgeladen (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Operating system

  • 2. GROUP MEMBERS {B/B1} !NAME !ENROLLMENT *AKSHAT MODI : 216230316135 *KARTIKEY BANJARA : 216230316129 *MEET DIXIT: 216230316136 *AVI PRAJAPATI : 216230316171
  • 3. PROJECT TITEL {KALI LINUX} •Kali Linux (formerly known as BackTrack Linux) is an open- source, Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing.
  • 4. KALI LINUX HISTORY • Kali Linux is based on years of knowledge and experience of building a pentestion testing Operating Systems, which has spanned over multiple previous projects. During all these project’s life-time, there has been only a few different developers, as the team has always been small. As a result, Kali has been years in the making and has come a long way. • The first project was called Whoppix, which stood for White Hat Knoppix. As can be inferred from the name, it was based on Knoppix for the underlining OS. Whoppix had releases ranging from v2.0 to v2.7.
  • 5. • This made way for the next project, WHAX (or the long hand, WhiteHat Slax). The name change was because the base OS changed from Knoppix to Slax. WHAX started at v3, as a nod towards it carrying on from Whoppix. • There was a similar OS being produced at the same time, Auditor Security Collection (often getting shorted to just Auditor), once again using Knoppix, and efforts were combined (with WHAX) to produce BackTrack. BackTrack was based on Slackware from v1 to v3, but switched to Ubuntu later on with v4 to v5.
  • 6. KALI NETHUNTER HISTORY • Kali NetHunter is a custom OS for Android devices. This takes Kali Linux desktop and makes it mobile. • Kali NetHunter is made up of three parts: • (ROM) • [App (and AppStore)] • (Kali Chroot)
  • 7. • Kali Net Hunter was first released in September 2014 with v1.0, supporting just Nexus devices (5,7 and 10). There was a minor release of Kali NetHunter v1.1 in January 2015, and at the same time device support started to appear, such as OnePlus One and Nexus 4. • Kali Net Hunter v3 was the next major release in January 2016, which was a complete Net Hunter app rewrite, allowing for more control and actions to be performed from it, build scripts and Android 5 and 6 support. Nexus 6 device also became supported. • Kali Net Hunter then joined the rolling release with 2019.2 release in May 2019, where 13 devices where supported, with a mixture of Android 4 to 9. From this point, Kali Net Hunter matched the release points of Kali Linux, with each of them adding more devices support, image and overall features.
  • 8. WHAT IS KALI LINUX? • Kali Linux (formerly known as BackTrack Linux) is an open-source, Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. It does this by providing common tools, configurations, and automations which allows the user to focus on the task that needs to be completed, not the surrounding activity. • Kali Linux contains industry specific modifications as well as several hundred tools targeted towards various Information Security tasks, such as Penetration Testing, Security Research, Computer Forensics, Reverse Engineering, Vulnerability Management and Red Team Testing. • Kali Linux is a multi-platform solution, accessible and freely available to information security professionals and hobbyists.
  • 9. KALI LINUX FEATURES • More than 600 penetration testing tools included: After reviewing every tool that was included in BackTrack, we eliminated a great number of tools that either simply did not work or which duplicated other tools that provided the same or similar functionality. Details on what’s included are on the Kali Tools site. • Free (as in beer) and always will be: Kali Linux, like BackTrack, is completely free of charge and always will be. You will never, ever have to pay for Kali Linux. • Open source Git tree: We are committed to the open source development model and our development tree is available for all to see. All of the source code which goes into Kali Linux is available for anyone who wants to tweak or rebuild packages to suit their specific needs. • FHS compliant: Kali adheres to the Filesystem Hierarchy Standard, allowing Linux users to easily locate binaries, support files, libraries, etc. • Wide-ranging wireless device support: A regular sticking point with Linux distributions has been support for wireless interfaces. We have built Kali Linux to support as many wireless devices as we possibly can, allowing it to run properly on a wide variety of hardware and making it compatible with numerous USB and other wireless devices.
  • 10. • Custom kernel, patched for injection: As penetration testers, the development team often needs to do wireless assessments, so our kernel has the latest injection patches included. • Developed in a secure environment: The Kali Linux team is made up of a small group of individuals who are the only ones trusted to commit packages and interact with the repositories, all of which is done using multiple secure protocols. • GPG signed packages and repositories: Every package in Kali Linux is signed by each individual developer who built and committed it, and the repositories subsequently sign the packages as well. • Multi-language support: Although penetration tools tend to be written in English, we have ensured that Kali includes true multilingual support, allowing more users to operate in their native language and locate the tools they need for the job. • Completely customizable: We thoroughly understand that not everyone will agree with our design decisions, so we have made it as easy as possible for our more adventurous users to customize Kali Linux to their liking, all the way down to the kernel. •
  • 11. • ARMEL and ARMHF support: Since ARM-based single-board systems like the Raspberry Pi and {BeagleBone} Black, among others, are becoming more and more prevalent and inexpensive, we knew that Kali’s ARM support would need to be as robust as we could manage, with fully working installations for both ARMEL and ARMHF systems. Kali Linux is available on a wide range of ARM devices and has ARM repositories integrated with the mainline distribution so tools for ARM are updated in conjunction with the rest of the distribution. • For more features of Kali Linux, please see the following page: Kali Linux Overview. • Kali Linux is specifically tailored to the needs of penetration testing professionals, and therefore all documentation on this site assumes prior knowledge of, and familiarity with, the Linux operating system in general.
  • 12. WHAT’S DIFFERENT ABOUT KALI LINUX? • Kali Linux is specifically geared to meet the requirements of professional penetration testing and security auditing. To achieve this, several core changes have been implemented in Kali Linux which reflect these needs: 1.Network services disabled by default: Kali Linux contains systemd hooks that disable network services by default. These hooks allow us to install various services on Kali Linux, while ensuring that our distribution remains secure by default, no matter what packages are installed. Additional services such as Bluetooth are also blocklisted by default. 2.Custom Linux kernel: Kali Linux uses an upstream kernel, patched for wireless injection. 3.A minimal and trusted set of repositories: given the aims and goals of Kali Linux, maintaining the integrity of the system as a whole is absolutely key. With that goal in mind, the set of upstream software sources which Kali uses is kept to an absolute minimum. Many new Kali users are tempted to add additional repositories to their sources list, but doing so runs a very serious risk of breaking your Kali Linux installation.