Introduction to Kali Linux by Lucas A. Rosevear and Peter Greko
Staying in Scope Attempting to compromise a system that you do not have explicit permission to attempt to compromise is illegal. Even penetration testers can also face charges if they go outside of the explicitly defined scope of the engagement. Only conduct testing on the specific functionality you have been given written permission to test, or on virtual machines that you control.
Agenda Who are we? What is Kali Linux? Live Demo Questions
Who are we? Security Consultants Network penetration testing Application security Code review Etc.
Kali Linux Linux distro based on Debian Security testing and computer forensics tools compilation. Ease of use Over 300 penetration testing programs Supports a variety of architectures. (including ARM) Used for compatibility Easy to expand. Portable. Flaws: Root access by design. Small set of repositories, adding new ones will probably break stuff. Not a beginner’s distro.
Alternatives to Kali Linux Backbox https://backbox.org/ Deft http://www.deftlinux.net/ Matriux -Backbox- Free Open Source Community project with the aim to promote the culture of security in IT environment and give its contribute to make it better and safer. Stealth toolkit -Deft- Digital Evidence & Forensics Toolkit - based on GNU Linux -Matriux- based on Debian consisting of a powerful bunch of more than 300 open source and free tools that can be used for various purposes including, but not limited to, penetration testing, ethical hacking, system and network administration, cyber forensics investigations, security testing, vulnerability analysis, and much more
Using Kali Linux Download Virtual Machine Installation https://www.kali.org/downloads/ Virtual Machine https://www.virtualbox.org/wiki/Downloads/ Installation https://forums.kali.org/showthread.php?74-Installing-Kali-Linux-as-a-Virtual- Machine-in-Virtual-Box
Demonstration of Kali Where to get it. How it boots up. Kali Tools Screenshot
Kali Linux Tools EyeWitness Nmap Remmina Burp Suite Metasploit Nmap Telnet /usr/share/webshells/jsp/cmdjsp.jsp on port 8180 Metasploit
Tools Demo VNC Kali tools screenshot
Question and Answer