SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Presented by:
Mirza Taimoor Sultan Baig
Introduction
• Kali Linux is the most effective and widely used penetration testing tool in the world,
with penetration testers, forensics experts, reverse engineers, and vulnerability
assessors all using it.
• Kali Linux is a multi-platform solution that information security professionals and
hobbyists can use for free.
• Kali Linux includes a large number of resources for various information security
activities, including penetration testing, security research, computer forensics, and
reverse engineering.
Types of Software
There are two types of software
• Application software
• System software
Types of operating software
• Microsoft window
• Linix
• Unix
• Many more
Kali Linux Features
• More than600 penetration testing tools included
• Free (as in beer) and always will be
• Open Source Git tree
• FHS compliant
• Wide-ranging wireless device support
• Custom kernel, patched for injection
• Developed in a secure environment
• GPG signed packages and repositories
• Multi-language support
• Completely customizable
• ARMEL and ARMHF support
Should I Use Kali Linux?
Kali Linux is designed to meet the needs of penetration testing and security auditing
professionals. To accomplish this, Kali Linux has undergone a number of significant
changes to reflect these requirements:
Network services disabled by default :System hooks in Kali Linux disable network
services by default. These hooks allow us to install a variety of services on Kali Linux
while also ensuring that our distribution is stable by default, regardless of which
packages are installed. Additional networks, such as Bluetooth, are automatically
blacklisted.
Custom Linux kernel :Kali Linux makes use of an upstream kernel that has been
patched to enable wireless injection.
A minimal and trusted set of repositories: Given Kali Linux's priorities and objectives,
preserving the system's overall integrity is critical. With that in mind, the number of
upstream software sources used by Kali is held to a bare minimum. Many new Kali
users are tempted to expand their sources by adding more repositories. list, but you
run the risk of destroying your Kali Linux installation if you do so.
Hardware Required
• A minimum of 20GB disk space for the kalilinix
install.
• RAM for i386 and amd64 architectures, minimum 1GB
remmonded 2GB or more.
• CD-DVD Drive/USB boot support
Advantage and Disadvantage
Advantage
• The main disadvantage of kali linix is that is help us test penetrating legally, give us a
benefits to find out loop holes which serve as open entry points to our system.
• Basically helping us to safe than sorry.
• It is highly secure.
Disadvantage
• The disadvantage of this system is that it does not function like a normal OS and can not be
use as one.
• It gives a complete access an knowledge of penetration, that if not used wisely could have a
near disastrous effect.
Warning
• Use of these tools against a live website
for which you don’t have a permission , is
illegal and may land you in JAIL
IMPORTANT LAW
• 18 U.S. Code § 1029 -Fraud and related
activity in connection with access devices
• 18 U.S. Code § 1030 - Fraud and related
activity in connection with computers
kali linix

Weitere ähnliche Inhalte

Was ist angesagt?

Contain your risk: Deploy secure containers with trust and confidence
Contain your risk: Deploy secure containers with trust and confidenceContain your risk: Deploy secure containers with trust and confidence
Contain your risk: Deploy secure containers with trust and confidence
Black Duck by Synopsys
 

Was ist angesagt? (20)

Maemo 6 Platform Security
Maemo 6 Platform SecurityMaemo 6 Platform Security
Maemo 6 Platform Security
 
Secure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliverySecure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous Delivery
 
Product Spotlight: Red Hat Enterprise Linux for Servers and Desktops
Product Spotlight: Red Hat Enterprise Linux for Servers and DesktopsProduct Spotlight: Red Hat Enterprise Linux for Servers and Desktops
Product Spotlight: Red Hat Enterprise Linux for Servers and Desktops
 
Kal i linux
Kal i linuxKal i linux
Kal i linux
 
Microservice et identité
Microservice et identitéMicroservice et identité
Microservice et identité
 
Practical Steps to Scale Legal Support for Open Source
Practical Steps to Scale Legal Support for Open SourcePractical Steps to Scale Legal Support for Open Source
Practical Steps to Scale Legal Support for Open Source
 
PCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s MissingPCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s Missing
 
Attacking VPN's
Attacking VPN'sAttacking VPN's
Attacking VPN's
 
Myths and Misperceptions of Open Source Security
Myths and Misperceptions of Open Source Security Myths and Misperceptions of Open Source Security
Myths and Misperceptions of Open Source Security
 
Vp ns
Vp nsVp ns
Vp ns
 
Integrating Black Duck into your Agile DevOps Environment
Integrating Black Duck into your Agile DevOps EnvironmentIntegrating Black Duck into your Agile DevOps Environment
Integrating Black Duck into your Agile DevOps Environment
 
NTXISSACSC3 - Critical Criteria for (Cloud) Workload Security by Steve Armend...
NTXISSACSC3 - Critical Criteria for (Cloud) Workload Security by Steve Armend...NTXISSACSC3 - Critical Criteria for (Cloud) Workload Security by Steve Armend...
NTXISSACSC3 - Critical Criteria for (Cloud) Workload Security by Steve Armend...
 
Customer Case Study: ScienceLogic - Many Paths to Compliance
Customer Case Study: ScienceLogic - Many Paths to ComplianceCustomer Case Study: ScienceLogic - Many Paths to Compliance
Customer Case Study: ScienceLogic - Many Paths to Compliance
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Security in the Age of Open Source
Security in the Age of Open SourceSecurity in the Age of Open Source
Security in the Age of Open Source
 
Contain your risk: Deploy secure containers with trust and confidence
Contain your risk: Deploy secure containers with trust and confidenceContain your risk: Deploy secure containers with trust and confidence
Contain your risk: Deploy secure containers with trust and confidence
 
Secure application deployment in Apache CloudStack
Secure application deployment in Apache CloudStackSecure application deployment in Apache CloudStack
Secure application deployment in Apache CloudStack
 
XML Interfaces to the popular Nessus Scanner
XML Interfaces to the popular Nessus ScannerXML Interfaces to the popular Nessus Scanner
XML Interfaces to the popular Nessus Scanner
 
CSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami LaihoCSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami Laiho
 
CSF18 - The Night is Dark and Full of Hackers - Sami Laiho
CSF18 - The Night is Dark and Full of Hackers - Sami LaihoCSF18 - The Night is Dark and Full of Hackers - Sami Laiho
CSF18 - The Night is Dark and Full of Hackers - Sami Laiho
 

Ähnlich wie kali linix

Ähnlich wie kali linix (20)

Kali linux os
Kali linux osKali linux os
Kali linux os
 
Operating system
Operating systemOperating system
Operating system
 
linux.pptx
linux.pptxlinux.pptx
linux.pptx
 
Kali presentation
Kali presentationKali presentation
Kali presentation
 
Kali linux.ppt
Kali linux.pptKali linux.ppt
Kali linux.ppt
 
Kalilinux
KalilinuxKalilinux
Kalilinux
 
Kali Linux
Kali LinuxKali Linux
Kali Linux
 
kali linux
kali linuxkali linux
kali linux
 
Kali Linux
Kali LinuxKali Linux
Kali Linux
 
Kali Linux
Kali LinuxKali Linux
Kali Linux
 
Eliz seminar
Eliz seminar Eliz seminar
Eliz seminar
 
Kali linux
Kali linuxKali linux
Kali linux
 
Unleash the Power: How to Install Kali Linux With a Twist
Unleash the Power: How to Install Kali Linux With a TwistUnleash the Power: How to Install Kali Linux With a Twist
Unleash the Power: How to Install Kali Linux With a Twist
 
Operating project
Operating projectOperating project
Operating project
 
Kali linux
Kali linuxKali linux
Kali linux
 
Kali linux summarised
Kali linux summarisedKali linux summarised
Kali linux summarised
 
Infosecurity.be 2019: What are relevant open source security tools you should...
Infosecurity.be 2019: What are relevant open source security tools you should...Infosecurity.be 2019: What are relevant open source security tools you should...
Infosecurity.be 2019: What are relevant open source security tools you should...
 
Kali Linux-Operating System Presentation.pptx
Kali Linux-Operating System Presentation.pptxKali Linux-Operating System Presentation.pptx
Kali Linux-Operating System Presentation.pptx
 
Kali linux
Kali linuxKali linux
Kali linux
 
Linux a free and open source operating system
Linux a free and open source operating systemLinux a free and open source operating system
Linux a free and open source operating system
 

Mehr von Mirza Baig

INVESTIGATING THE USE OF IMPEDANCE PLETHYSMOGRAPHY FOR DETECTING DECREASED BL...
INVESTIGATING THE USE OF IMPEDANCE PLETHYSMOGRAPHY FOR DETECTING DECREASED BL...INVESTIGATING THE USE OF IMPEDANCE PLETHYSMOGRAPHY FOR DETECTING DECREASED BL...
INVESTIGATING THE USE OF IMPEDANCE PLETHYSMOGRAPHY FOR DETECTING DECREASED BL...
Mirza Baig
 
Power Electronics
Power Electronics Power Electronics
Power Electronics
Mirza Baig
 
Automatic Solar Vertical Car Parking
Automatic Solar Vertical Car ParkingAutomatic Solar Vertical Car Parking
Automatic Solar Vertical Car Parking
Mirza Baig
 
state space modeling of electrical system
state space modeling of electrical systemstate space modeling of electrical system
state space modeling of electrical system
Mirza Baig
 

Mehr von Mirza Baig (20)

INVESTIGATING THE USE OF IMPEDANCE PLETHYSMOGRAPHY FOR DETECTING DECREASED BL...
INVESTIGATING THE USE OF IMPEDANCE PLETHYSMOGRAPHY FOR DETECTING DECREASED BL...INVESTIGATING THE USE OF IMPEDANCE PLETHYSMOGRAPHY FOR DETECTING DECREASED BL...
INVESTIGATING THE USE OF IMPEDANCE PLETHYSMOGRAPHY FOR DETECTING DECREASED BL...
 
Hemodynamic monitor by using IPG Technique
Hemodynamic monitor by using IPG TechniqueHemodynamic monitor by using IPG Technique
Hemodynamic monitor by using IPG Technique
 
BIOMEDICAL SENSORS.pptx
BIOMEDICAL SENSORS.pptxBIOMEDICAL SENSORS.pptx
BIOMEDICAL SENSORS.pptx
 
Fingerprint Recognition
Fingerprint RecognitionFingerprint Recognition
Fingerprint Recognition
 
Power Electronics
Power ElectronicsPower Electronics
Power Electronics
 
OPTICAL SENSORS AND THEIR APPLICATIONS
OPTICAL SENSORS AND THEIR APPLICATIONS	OPTICAL SENSORS AND THEIR APPLICATIONS
OPTICAL SENSORS AND THEIR APPLICATIONS
 
wireshark
wiresharkwireshark
wireshark
 
Power Electronics
Power Electronics Power Electronics
Power Electronics
 
GNU Radio
GNU RadioGNU Radio
GNU Radio
 
Automatic Solar Vertical Car Parking
Automatic Solar Vertical Car ParkingAutomatic Solar Vertical Car Parking
Automatic Solar Vertical Car Parking
 
state space modeling of electrical system
state space modeling of electrical systemstate space modeling of electrical system
state space modeling of electrical system
 
optical sensor
 optical sensor optical sensor
optical sensor
 
AUTOMATIC SOLAR VERTICAL CAR PARKING SYSTEM
      AUTOMATIC  SOLAR VERTICAL CAR PARKING SYSTEM      AUTOMATIC  SOLAR VERTICAL CAR PARKING SYSTEM
AUTOMATIC SOLAR VERTICAL CAR PARKING SYSTEM
 
A Comprehensive Analysis of Forearm Impedance Plethysmography for the Maximal...
A Comprehensive Analysis of Forearm Impedance Plethysmography for the Maximal...A Comprehensive Analysis of Forearm Impedance Plethysmography for the Maximal...
A Comprehensive Analysis of Forearm Impedance Plethysmography for the Maximal...
 
Determination of Cardiac Output based on Minimally Invasive Impedance Plethys...
Determination of Cardiac Output based on Minimally Invasive Impedance Plethys...Determination of Cardiac Output based on Minimally Invasive Impedance Plethys...
Determination of Cardiac Output based on Minimally Invasive Impedance Plethys...
 
BIO-ELECTRICAL IMPEDENCE PLETHYSMOGRAPHYDESIGNING AN EFFICIENT NON-INVASIVE E...
BIO-ELECTRICAL IMPEDENCE PLETHYSMOGRAPHYDESIGNING AN EFFICIENT NON-INVASIVE E...BIO-ELECTRICAL IMPEDENCE PLETHYSMOGRAPHYDESIGNING AN EFFICIENT NON-INVASIVE E...
BIO-ELECTRICAL IMPEDENCE PLETHYSMOGRAPHYDESIGNING AN EFFICIENT NON-INVASIVE E...
 
Development of an Adaptive Multi-sensor to Prevent Venous Stasis
Development of an Adaptive Multi-sensor to Prevent Venous StasisDevelopment of an Adaptive Multi-sensor to Prevent Venous Stasis
Development of an Adaptive Multi-sensor to Prevent Venous Stasis
 
Automatic digital-analog impedance plethysmography
Automatic digital-analog impedance plethysmographyAutomatic digital-analog impedance plethysmography
Automatic digital-analog impedance plethysmography
 
Automatic digital-analog impedance plethysmograph
Automatic digital-analog impedance plethysmographAutomatic digital-analog impedance plethysmograph
Automatic digital-analog impedance plethysmograph
 
Wearable Belt With Built-In Textile Electrodes for Cardio—Respiratory Monitor...
Wearable Belt With Built-In Textile Electrodes for Cardio—Respiratory Monitor...Wearable Belt With Built-In Textile Electrodes for Cardio—Respiratory Monitor...
Wearable Belt With Built-In Textile Electrodes for Cardio—Respiratory Monitor...
 

Kürzlich hochgeladen

1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
HenryBriggs2
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
pritamlangde
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 

Kürzlich hochgeladen (20)

1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 

kali linix

  • 2. Introduction • Kali Linux is the most effective and widely used penetration testing tool in the world, with penetration testers, forensics experts, reverse engineers, and vulnerability assessors all using it. • Kali Linux is a multi-platform solution that information security professionals and hobbyists can use for free. • Kali Linux includes a large number of resources for various information security activities, including penetration testing, security research, computer forensics, and reverse engineering.
  • 3. Types of Software There are two types of software • Application software • System software Types of operating software • Microsoft window • Linix • Unix • Many more
  • 4. Kali Linux Features • More than600 penetration testing tools included • Free (as in beer) and always will be • Open Source Git tree • FHS compliant • Wide-ranging wireless device support • Custom kernel, patched for injection • Developed in a secure environment • GPG signed packages and repositories • Multi-language support • Completely customizable • ARMEL and ARMHF support
  • 5. Should I Use Kali Linux? Kali Linux is designed to meet the needs of penetration testing and security auditing professionals. To accomplish this, Kali Linux has undergone a number of significant changes to reflect these requirements: Network services disabled by default :System hooks in Kali Linux disable network services by default. These hooks allow us to install a variety of services on Kali Linux while also ensuring that our distribution is stable by default, regardless of which packages are installed. Additional networks, such as Bluetooth, are automatically blacklisted. Custom Linux kernel :Kali Linux makes use of an upstream kernel that has been patched to enable wireless injection. A minimal and trusted set of repositories: Given Kali Linux's priorities and objectives, preserving the system's overall integrity is critical. With that in mind, the number of upstream software sources used by Kali is held to a bare minimum. Many new Kali
  • 6. users are tempted to expand their sources by adding more repositories. list, but you run the risk of destroying your Kali Linux installation if you do so.
  • 7. Hardware Required • A minimum of 20GB disk space for the kalilinix install. • RAM for i386 and amd64 architectures, minimum 1GB remmonded 2GB or more. • CD-DVD Drive/USB boot support
  • 8. Advantage and Disadvantage Advantage • The main disadvantage of kali linix is that is help us test penetrating legally, give us a benefits to find out loop holes which serve as open entry points to our system. • Basically helping us to safe than sorry. • It is highly secure. Disadvantage • The disadvantage of this system is that it does not function like a normal OS and can not be use as one. • It gives a complete access an knowledge of penetration, that if not used wisely could have a near disastrous effect.
  • 9.
  • 10.
  • 11. Warning • Use of these tools against a live website for which you don’t have a permission , is illegal and may land you in JAIL IMPORTANT LAW • 18 U.S. Code § 1029 -Fraud and related activity in connection with access devices • 18 U.S. Code § 1030 - Fraud and related activity in connection with computers