SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Downloaden Sie, um offline zu lesen
WELCOME
O.S PROJECT BY OUR GROUP
GROUP MEMBERS {B/B1}
!NAME !ENROLLMENT
*AKSHAT MODI : 216230316135
*KARTIKEY BANJARA : 216230316129
*MEET DIXIT: 216230316136
*AVI PRAJAPATI : 216230316171
PROJECT TITEL {KALI LINUX}
•Kali Linux (formerly known as BackTrack Linux) is an open-
source, Debian-based Linux distribution aimed at
advanced Penetration Testing and Security Auditing.
KALI LINUX HISTORY
• Kali Linux is based on years of knowledge and experience of
building a pentestion testing Operating Systems, which has
spanned over multiple previous projects. During all these
project’s life-time, there has been only a few different developers,
as the team has always been small. As a result, Kali has been
years in the making and has come a long way.
• The first project was called Whoppix, which stood for White Hat
Knoppix. As can be inferred from the name, it was based on
Knoppix for the underlining OS. Whoppix had releases ranging
from v2.0 to v2.7.
• This made way for the next project, WHAX (or the long
hand, WhiteHat Slax). The name change was because the base OS
changed from Knoppix to Slax. WHAX started at v3, as a nod
towards it carrying on from Whoppix.
• There was a similar OS being produced at the same time, Auditor
Security Collection (often getting shorted to just Auditor), once
again using Knoppix, and efforts were combined (with WHAX) to
produce BackTrack. BackTrack was based on Slackware from v1
to v3, but switched to Ubuntu later on with v4 to v5.
KALI NETHUNTER HISTORY
• Kali NetHunter is a custom OS for Android devices. This takes Kali
Linux desktop and makes it mobile.
• Kali NetHunter is made up of three parts:
• (ROM)
• [App (and AppStore)]
• (Kali Chroot)
• Kali Net Hunter was first released in September 2014 with v1.0,
supporting just Nexus devices (5,7 and 10). There was a minor
release of Kali NetHunter v1.1 in January 2015, and at the same
time device support started to appear, such as OnePlus One and
Nexus 4.
• Kali Net Hunter v3 was the next major release in January 2016,
which was a complete Net Hunter app rewrite, allowing for more
control and actions to be performed from it, build scripts and
Android 5 and 6 support. Nexus 6 device also became supported.
• Kali Net Hunter then joined the rolling release with 2019.2
release in May 2019, where 13 devices where supported, with a
mixture of Android 4 to 9. From this point, Kali Net Hunter
matched the release points of Kali Linux, with each of them
adding more devices support, image and overall features.
WHAT IS KALI LINUX?
• Kali Linux (formerly known as BackTrack Linux) is an open-source, Debian-based
Linux distribution aimed at advanced Penetration Testing and Security
Auditing. It does this by providing common tools, configurations, and
automations which allows the user to focus on the task that needs to be
completed, not the surrounding activity.
• Kali Linux contains industry specific modifications as well as several hundred
tools targeted towards various Information Security tasks, such as Penetration
Testing, Security Research, Computer Forensics, Reverse Engineering,
Vulnerability Management and Red Team Testing.
• Kali Linux is a multi-platform solution, accessible and freely available to
information security professionals and hobbyists.
KALI LINUX FEATURES
• More than 600 penetration testing tools included: After reviewing every tool that was included
in BackTrack, we eliminated a great number of tools that either simply did not work or which
duplicated other tools that provided the same or similar functionality. Details on what’s included
are on the Kali Tools site.
• Free (as in beer) and always will be: Kali Linux, like BackTrack, is completely free of charge and
always will be. You will never, ever have to pay for Kali Linux.
• Open source Git tree: We are committed to the open source development model and
our development tree is available for all to see. All of the source code which goes into Kali Linux is
available for anyone who wants to tweak or rebuild packages to suit their specific needs.
• FHS compliant: Kali adheres to the Filesystem Hierarchy Standard, allowing Linux users to easily
locate binaries, support files, libraries, etc.
• Wide-ranging wireless device support: A regular sticking point with Linux distributions has been
support for wireless interfaces. We have built Kali Linux to support as many wireless devices as we
possibly can, allowing it to run properly on a wide variety of hardware and making it compatible
with numerous USB and other wireless devices.
• Custom kernel, patched for injection: As penetration testers, the
development team often needs to do wireless assessments, so our kernel has
the latest injection patches included.
• Developed in a secure environment: The Kali Linux team is made up of a
small group of individuals who are the only ones trusted to commit packages
and interact with the repositories, all of which is done using multiple secure
protocols.
• GPG signed packages and repositories: Every package in Kali Linux is signed by each
individual developer who built and committed it, and the repositories subsequently sign
the packages as well.
• Multi-language support: Although penetration tools tend to be written in English, we
have ensured that Kali includes true multilingual support, allowing more users to
operate in their native language and locate the tools they need for the job.
• Completely customizable: We thoroughly understand that not everyone will agree with
our design decisions, so we have made it as easy as possible for our more adventurous
users to customize Kali Linux to their liking, all the way down to the kernel.
•
• ARMEL and ARMHF support: Since ARM-based single-board
systems like the Raspberry Pi and {BeagleBone} Black, among
others, are becoming more and more prevalent and inexpensive,
we knew that Kali’s ARM support would need to be as robust as
we could manage, with fully working installations for both ARMEL
and ARMHF systems. Kali Linux is available on a wide range of
ARM devices and has ARM repositories integrated with the
mainline distribution so tools for ARM are updated in conjunction
with the rest of the distribution.
• For more features of Kali Linux, please see the following page: Kali
Linux Overview.
• Kali Linux is specifically tailored to the needs of penetration
testing professionals, and therefore all documentation on this site
assumes prior knowledge of, and familiarity with, the Linux
operating system in general.
WHAT’S DIFFERENT ABOUT KALI LINUX?
• Kali Linux is specifically geared to meet the requirements of professional penetration
testing and security auditing. To achieve this, several core changes have been
implemented in Kali Linux which reflect these needs:
1.Network services disabled by default: Kali Linux contains systemd hooks that disable network
services by default. These hooks allow us to install various services on Kali Linux, while ensuring
that our distribution remains secure by default, no matter what packages are installed. Additional
services such as Bluetooth are also blocklisted by default.
2.Custom Linux kernel: Kali Linux uses an upstream kernel, patched for wireless
injection.
3.A minimal and trusted set of repositories: given the aims and goals of Kali Linux, maintaining the
integrity of the system as a whole is absolutely key. With that goal in mind, the set of upstream
software sources which Kali uses is kept to an absolute minimum. Many new Kali users are tempted
to add additional repositories to their sources list, but doing so runs a very serious risk of breaking
your Kali Linux installation.
Thank you

Weitere ähnliche Inhalte

Ähnlich wie Operating system

Unleash the Power: How to Install Kali Linux With a Twist
Unleash the Power: How to Install Kali Linux With a TwistUnleash the Power: How to Install Kali Linux With a Twist
Unleash the Power: How to Install Kali Linux With a TwistFredReynolds2
 
Kali Linux-Operating System Presentation.pptx
Kali Linux-Operating System Presentation.pptxKali Linux-Operating System Presentation.pptx
Kali Linux-Operating System Presentation.pptxSumaiyaSinja1
 
Shamsa altayer 10bg kali linux
Shamsa altayer 10bg   kali linuxShamsa altayer 10bg   kali linux
Shamsa altayer 10bg kali linuxshamsaot
 
penetration test using Kali linux seminar report
penetration test using Kali linux seminar reportpenetration test using Kali linux seminar report
penetration test using Kali linux seminar reportAbhayNaik8
 
(03 2013) guide to kali linux
(03 2013)   guide to kali linux(03 2013)   guide to kali linux
(03 2013) guide to kali linuxjulius77
 
Kali Linux - Falconer - ISS 2014
Kali Linux - Falconer - ISS 2014Kali Linux - Falconer - ISS 2014
Kali Linux - Falconer - ISS 2014TGodfrey
 
Top 10 dev ops tools (1)
Top 10 dev ops tools (1)Top 10 dev ops tools (1)
Top 10 dev ops tools (1)yalini97
 
01 linux history overview
01 linux history overview01 linux history overview
01 linux history overviewShay Cohen
 

Ähnlich wie Operating system (20)

Kali Linux
Kali LinuxKali Linux
Kali Linux
 
kali linux
kali linuxkali linux
kali linux
 
Unleash the Power: How to Install Kali Linux With a Twist
Unleash the Power: How to Install Kali Linux With a TwistUnleash the Power: How to Install Kali Linux With a Twist
Unleash the Power: How to Install Kali Linux With a Twist
 
Kali linux
Kali linuxKali linux
Kali linux
 
Kali Linux
Kali LinuxKali Linux
Kali Linux
 
Kali Linux-Operating System Presentation.pptx
Kali Linux-Operating System Presentation.pptxKali Linux-Operating System Presentation.pptx
Kali Linux-Operating System Presentation.pptx
 
Shamsa altayer 10bg kali linux
Shamsa altayer 10bg   kali linuxShamsa altayer 10bg   kali linux
Shamsa altayer 10bg kali linux
 
Kali linux 2021.2
Kali linux 2021.2Kali linux 2021.2
Kali linux 2021.2
 
penetration test using Kali linux seminar report
penetration test using Kali linux seminar reportpenetration test using Kali linux seminar report
penetration test using Kali linux seminar report
 
(03 2013) guide to kali linux
(03 2013)   guide to kali linux(03 2013)   guide to kali linux
(03 2013) guide to kali linux
 
Kali linux
Kali linuxKali linux
Kali linux
 
Kali Linux
Kali Linux Kali Linux
Kali Linux
 
Kali Linux - Falconer - ISS 2014
Kali Linux - Falconer - ISS 2014Kali Linux - Falconer - ISS 2014
Kali Linux - Falconer - ISS 2014
 
Kali linux
Kali linuxKali linux
Kali linux
 
Kalilinux
KalilinuxKalilinux
Kalilinux
 
Kali linux.ppt
Kali linux.pptKali linux.ppt
Kali linux.ppt
 
linux.pptx
linux.pptxlinux.pptx
linux.pptx
 
Top 10 dev ops tools (1)
Top 10 dev ops tools (1)Top 10 dev ops tools (1)
Top 10 dev ops tools (1)
 
Kal i linux
Kal i linuxKal i linux
Kal i linux
 
01 linux history overview
01 linux history overview01 linux history overview
01 linux history overview
 

Kürzlich hochgeladen

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Kürzlich hochgeladen (20)

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

Operating system

  • 2. GROUP MEMBERS {B/B1} !NAME !ENROLLMENT *AKSHAT MODI : 216230316135 *KARTIKEY BANJARA : 216230316129 *MEET DIXIT: 216230316136 *AVI PRAJAPATI : 216230316171
  • 3. PROJECT TITEL {KALI LINUX} •Kali Linux (formerly known as BackTrack Linux) is an open- source, Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing.
  • 4. KALI LINUX HISTORY • Kali Linux is based on years of knowledge and experience of building a pentestion testing Operating Systems, which has spanned over multiple previous projects. During all these project’s life-time, there has been only a few different developers, as the team has always been small. As a result, Kali has been years in the making and has come a long way. • The first project was called Whoppix, which stood for White Hat Knoppix. As can be inferred from the name, it was based on Knoppix for the underlining OS. Whoppix had releases ranging from v2.0 to v2.7.
  • 5. • This made way for the next project, WHAX (or the long hand, WhiteHat Slax). The name change was because the base OS changed from Knoppix to Slax. WHAX started at v3, as a nod towards it carrying on from Whoppix. • There was a similar OS being produced at the same time, Auditor Security Collection (often getting shorted to just Auditor), once again using Knoppix, and efforts were combined (with WHAX) to produce BackTrack. BackTrack was based on Slackware from v1 to v3, but switched to Ubuntu later on with v4 to v5.
  • 6. KALI NETHUNTER HISTORY • Kali NetHunter is a custom OS for Android devices. This takes Kali Linux desktop and makes it mobile. • Kali NetHunter is made up of three parts: • (ROM) • [App (and AppStore)] • (Kali Chroot)
  • 7. • Kali Net Hunter was first released in September 2014 with v1.0, supporting just Nexus devices (5,7 and 10). There was a minor release of Kali NetHunter v1.1 in January 2015, and at the same time device support started to appear, such as OnePlus One and Nexus 4. • Kali Net Hunter v3 was the next major release in January 2016, which was a complete Net Hunter app rewrite, allowing for more control and actions to be performed from it, build scripts and Android 5 and 6 support. Nexus 6 device also became supported. • Kali Net Hunter then joined the rolling release with 2019.2 release in May 2019, where 13 devices where supported, with a mixture of Android 4 to 9. From this point, Kali Net Hunter matched the release points of Kali Linux, with each of them adding more devices support, image and overall features.
  • 8. WHAT IS KALI LINUX? • Kali Linux (formerly known as BackTrack Linux) is an open-source, Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. It does this by providing common tools, configurations, and automations which allows the user to focus on the task that needs to be completed, not the surrounding activity. • Kali Linux contains industry specific modifications as well as several hundred tools targeted towards various Information Security tasks, such as Penetration Testing, Security Research, Computer Forensics, Reverse Engineering, Vulnerability Management and Red Team Testing. • Kali Linux is a multi-platform solution, accessible and freely available to information security professionals and hobbyists.
  • 9. KALI LINUX FEATURES • More than 600 penetration testing tools included: After reviewing every tool that was included in BackTrack, we eliminated a great number of tools that either simply did not work or which duplicated other tools that provided the same or similar functionality. Details on what’s included are on the Kali Tools site. • Free (as in beer) and always will be: Kali Linux, like BackTrack, is completely free of charge and always will be. You will never, ever have to pay for Kali Linux. • Open source Git tree: We are committed to the open source development model and our development tree is available for all to see. All of the source code which goes into Kali Linux is available for anyone who wants to tweak or rebuild packages to suit their specific needs. • FHS compliant: Kali adheres to the Filesystem Hierarchy Standard, allowing Linux users to easily locate binaries, support files, libraries, etc. • Wide-ranging wireless device support: A regular sticking point with Linux distributions has been support for wireless interfaces. We have built Kali Linux to support as many wireless devices as we possibly can, allowing it to run properly on a wide variety of hardware and making it compatible with numerous USB and other wireless devices.
  • 10. • Custom kernel, patched for injection: As penetration testers, the development team often needs to do wireless assessments, so our kernel has the latest injection patches included. • Developed in a secure environment: The Kali Linux team is made up of a small group of individuals who are the only ones trusted to commit packages and interact with the repositories, all of which is done using multiple secure protocols. • GPG signed packages and repositories: Every package in Kali Linux is signed by each individual developer who built and committed it, and the repositories subsequently sign the packages as well. • Multi-language support: Although penetration tools tend to be written in English, we have ensured that Kali includes true multilingual support, allowing more users to operate in their native language and locate the tools they need for the job. • Completely customizable: We thoroughly understand that not everyone will agree with our design decisions, so we have made it as easy as possible for our more adventurous users to customize Kali Linux to their liking, all the way down to the kernel. •
  • 11. • ARMEL and ARMHF support: Since ARM-based single-board systems like the Raspberry Pi and {BeagleBone} Black, among others, are becoming more and more prevalent and inexpensive, we knew that Kali’s ARM support would need to be as robust as we could manage, with fully working installations for both ARMEL and ARMHF systems. Kali Linux is available on a wide range of ARM devices and has ARM repositories integrated with the mainline distribution so tools for ARM are updated in conjunction with the rest of the distribution. • For more features of Kali Linux, please see the following page: Kali Linux Overview. • Kali Linux is specifically tailored to the needs of penetration testing professionals, and therefore all documentation on this site assumes prior knowledge of, and familiarity with, the Linux operating system in general.
  • 12. WHAT’S DIFFERENT ABOUT KALI LINUX? • Kali Linux is specifically geared to meet the requirements of professional penetration testing and security auditing. To achieve this, several core changes have been implemented in Kali Linux which reflect these needs: 1.Network services disabled by default: Kali Linux contains systemd hooks that disable network services by default. These hooks allow us to install various services on Kali Linux, while ensuring that our distribution remains secure by default, no matter what packages are installed. Additional services such as Bluetooth are also blocklisted by default. 2.Custom Linux kernel: Kali Linux uses an upstream kernel, patched for wireless injection. 3.A minimal and trusted set of repositories: given the aims and goals of Kali Linux, maintaining the integrity of the system as a whole is absolutely key. With that goal in mind, the set of upstream software sources which Kali uses is kept to an absolute minimum. Many new Kali users are tempted to add additional repositories to their sources list, but doing so runs a very serious risk of breaking your Kali Linux installation.