This document provides an overview of the Kali Linux operating system. Kali Linux is a Linux distribution designed for penetration testing and security auditing. It includes over 600 security tools for tasks like penetration testing, forensics, and reverse engineering. Some key features of Kali Linux include tools for wireless attacks, a customized kernel, and strict security measures like disabled network services by default. The document discusses whether Kali Linux is suitable and provides advantages like helping find security vulnerabilities, and disadvantages like not functioning as a normal OS. Hardware requirements and legal warnings are also outlined.
2. Introduction
• Kali Linux is the most effective and widely used penetration testing tool in the world,
with penetration testers, forensics experts, reverse engineers, and vulnerability
assessors all using it.
• Kali Linux is a multi-platform solution that information security professionals and
hobbyists can use for free.
• Kali Linux includes a large number of resources for various information security
activities, including penetration testing, security research, computer forensics, and
reverse engineering.
3. Types of Software
There are two types of software
• Application software
• System software
Types of operating software
• Microsoft window
• Linix
• Unix
• Many more
4. Kali Linux Features
• More than600 penetration testing tools included
• Free (as in beer) and always will be
• Open Source Git tree
• FHS compliant
• Wide-ranging wireless device support
• Custom kernel, patched for injection
• Developed in a secure environment
• GPG signed packages and repositories
• Multi-language support
• Completely customizable
• ARMEL and ARMHF support
5. Should I Use Kali Linux?
Kali Linux is designed to meet the needs of penetration testing and security auditing
professionals. To accomplish this, Kali Linux has undergone a number of significant
changes to reflect these requirements:
Network services disabled by default :System hooks in Kali Linux disable network
services by default. These hooks allow us to install a variety of services on Kali Linux
while also ensuring that our distribution is stable by default, regardless of which
packages are installed. Additional networks, such as Bluetooth, are automatically
blacklisted.
Custom Linux kernel :Kali Linux makes use of an upstream kernel that has been
patched to enable wireless injection.
A minimal and trusted set of repositories: Given Kali Linux's priorities and objectives,
preserving the system's overall integrity is critical. With that in mind, the number of
upstream software sources used by Kali is held to a bare minimum. Many new Kali
6. users are tempted to expand their sources by adding more repositories. list, but you
run the risk of destroying your Kali Linux installation if you do so.
7. Hardware Required
• A minimum of 20GB disk space for the kalilinix
install.
• RAM for i386 and amd64 architectures, minimum 1GB
remmonded 2GB or more.
• CD-DVD Drive/USB boot support
8. Advantage and Disadvantage
Advantage
• The main disadvantage of kali linix is that is help us test penetrating legally, give us a
benefits to find out loop holes which serve as open entry points to our system.
• Basically helping us to safe than sorry.
• It is highly secure.
Disadvantage
• The disadvantage of this system is that it does not function like a normal OS and can not be
use as one.
• It gives a complete access an knowledge of penetration, that if not used wisely could have a
near disastrous effect.
9.
10.
11. Warning
• Use of these tools against a live website
for which you don’t have a permission , is
illegal and may land you in JAIL
IMPORTANT LAW
• 18 U.S. Code § 1029 -Fraud and related
activity in connection with access devices
• 18 U.S. Code § 1030 - Fraud and related
activity in connection with computers