Introduction to Kali Linux

Slides:



Advertisements
Similar presentations
Hands-On Ethical Hacking and Network Defense
Advertisements

Lab 1. Overview – Why this lab Get to know the lab environment Get to know the lab environment Get a feeling for Linux Get a feeling for Linux Get a feeling.
Assessing Vulnerabilities ISA 4220 Server Systems Security James A. Edge Jr., CISSP, CISM, CISA, CPTE, MCSE Sr. Security Analyst Cincinnati Bell Technology.
LogMeIn.com By: Casey Davidson. What is it? Free Web-based VNC Client Remotely control any PC or Mac from anywhere in the world No network configuring.
Computer Security and Penetration Testing
Browser Exploitation Framework (BeEF) Lab
Thessaloniki November Penetration Testing with Android Devices Hacking with our pocket device, made easy! Thomas Sermpinis a.k.a. Cr0wTom.
Increasing Student Involvement with Hands-on Activities in Online Computer Science Classes Dr. Wayne Summers, Dr. Bhagyavati, Prof. Chris Whitehead Columbus.
The Business of Penetration Testing
Increasing Student Involvement with Hands-on Activities in Online Computer Science Classes Dr. Wayne Summers, Dr. Bhagyavati, Prof. Chris Whitehead Columbus.
Pen testing to ensure your security
April 14, 2008 Secure Coding Faculty Workshop Web Application Security: Exercise Development Approaches James Walden
POS/420 Introduction to Unix Philip Robbins – March 12, 2013 (Week 1)
Open Source Software An Introduction. The Creation of Software l As you know, programmers create the software that we use l What you may not understand.
Computers Under $100 Joey Cardenas. What will you be doing?  DIY Projects  Media Streamer  Security  Education.
Kali Linx Attacks Jim Nasto. Window 8 Computer On my Windows 8 64 bit OS machine. I started using a Virtual Machine using Hyper V Manager and shared the.
Chapter 1 Ethical Hacking Overview. Objectives After reading this chapter and completing the exercises, you will be able to: Describe the role of an ethical.
Ethical Hacking and Network Defense NCTT Winter Workshop January 11, 2006.
Anatomy of attacks Buffer Overflow attacks & Rootkits.
1 Security Penetration Testing Angela Davis Mrinmoy Ghosh ECE4112 – Internetwork Security Georgia Institute of Technology.
Presents Ethical Hacking For Inplant Training / Internship, please download the "Inplant training registration form" from our website.
Garrett Gee | ToorCon 12 Building a Portable Security Environment with.
CTC228 Nov Today... Catching up with group projects URLs and DNS Nmap Review for Test.
What Is Ubuntu? Open Source Uses Linux / GNU kernel Based On Debian Free! Sponsored by Canonical.
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
JMU GenCyber Boot Camp Summer, “Canned” Exploits For many known vulnerabilities attackers do not have to write their own exploit code Many repositories.
Ethical Hacking and Network Defense. Contact Information Sam Bowne Sam Bowne Website: samsclass.info Website:
By Collin Donaldson.  Origin of an OS: From UNIX to Kali Linux  Linux Architectures and Ubiquity  What is Kali and why should I use it?  Kali’s New.
Cyber Security – The Changing Landscape Erick Weber Department of Public Works Khaled Tawfik Cyber Security.
APACHE INSTALL Linux: CentOS 6.5 WHAT IS APACHE Apache is an open source application which is governed by the GNU licensing for use and alteration of.
Final Project: Advanced Security Blade IPS and DLP blades.
Department of Computer Science Introduction to Information Security Chapter 7 Activity Security Assessment Semester 1.
Learn Hacking – Part 1 - Requirement youtube.com/studentvideotutorial - Slides are available in description box below (youtube) / my website - By : Bijay.
Feeling Linux yourself Dr. Tran, Van Hoai Faculty of Computer Science and Engineering HCMC Uni. of Technology
Geeks Need Basements. Who am I? Started in computer industry in 1982 Specializing in security for the past 15 years ASS (Application Security Specialist)
APACHE INSTALL AWS Linux (Amazon Web Services EC2)
Defining your requirements for a successful security (and compliance
[blank page for bug work-around]
Exercise #1: Exploring Open-Source Operating Systems with Virtual Machines J. H. Wang Sep. 20, 2016.
Penetration Testing Scanning
??? ple r B Amulya Sai EDM14b005 What is simple scalar?? Simple scalar is an open source computer architecture simulator developed by Todd.
Topic 5 Penetration Testing 滲透測試
GENI, Pen Testing, & other stories
BruinTech Vendor Meet & Greet December 3, 2015
What is F/LOSS? By Scot Henderson.
Penetration Testing: Concepts,Attacks and Defence Stratagies
Penetration Testing Armitage: Metasploit GUI and Machine-Gun Style Attack CIS 6395, Incident Response Technologies Fall 2016, Dr. Cliff Zou
ETHICAL HACKING WHAT EXACTLY IS ETHICAL HACKING ? By : Bijay Acharya
MySQL Exploit with Metasploit
From Source Code to Packages and even whole distributions
A Comprehensive Security Assessment of the Westminster College Unix Lab Jacob Shodd.
Penetration Testing Presented by: Elham Hojati
Tor Good + Evil.
Selected topic in computer science (1)
Chris D Hicks Director of IT MCSE, MCP + Internet Security
Exploiting Metasploitable 2 with Metasploit in Kali-Linux 2016
Penetration Testing Presented by: Elham Hojati
Metasploit a one-stop hack shop
Exercise #1: Exploring Open-Source Operating Systems with Virtual Machines J. H. Wang Sep. 19, 2017.
NEED OF JAILBREAKING IN IOS PENETRATION TESTING
Linux Programming Environment How to Run Linux in Windows
Topic 5: Communication and the Internet
Backtrack Metasploit and SET
Intro to Kali Linux & Tools
Cyber Operation and Penetration Testing Online Password Cracking Cliff Zou University of Central Florida.
Virtual Machine and VirtualBox
Cyber Operation and Penetration Testing Armitage: Metasploit GUI and Machine-Gun Style Attack Cliff Zou University of Central Florida.
Hacking Linux and MacOS
Engineering Secure Software
Presentation transcript:

Introduction to Kali Linux by Lucas A. Rosevear and Peter Greko

Staying in Scope Attempting to compromise a system that you do not have explicit permission to attempt to compromise is illegal. Even penetration testers can also face charges if they go outside of the explicitly defined scope of the engagement. Only conduct testing on the specific functionality you have been given written permission to test, or on virtual machines that you control.

Agenda Who are we? What is Kali Linux? Live Demo Questions

Who are we? Security Consultants Network penetration testing Application security Code review Etc.

Kali Linux Linux distro based on Debian Security testing and computer forensics tools compilation. Ease of use Over 300 penetration testing programs Supports a variety of architectures. (including ARM) Used for compatibility Easy to expand. Portable. Flaws: Root access by design. Small set of repositories, adding new ones will probably break stuff. Not a beginner’s distro.

Alternatives to Kali Linux Backbox https://backbox.org/ Deft http://www.deftlinux.net/ Matriux -Backbox- Free Open Source Community project with the aim to promote the culture of security in IT environment and give its contribute to make it better and safer. Stealth toolkit -Deft- Digital Evidence & Forensics Toolkit - based on GNU Linux -Matriux-  based on Debian consisting of a powerful bunch of more than 300 open source and free tools that can be used for various purposes including, but not limited to, penetration testing, ethical hacking, system and network administration, cyber forensics investigations, security testing, vulnerability analysis, and much more

Using Kali Linux Download Virtual Machine Installation https://www.kali.org/downloads/ Virtual Machine https://www.virtualbox.org/wiki/Downloads/ Installation https://forums.kali.org/showthread.php?74-Installing-Kali-Linux-as-a-Virtual- Machine-in-Virtual-Box

Demonstration of Kali Where to get it. How it boots up. Kali Tools Screenshot

Kali Linux Tools EyeWitness Nmap Remmina Burp Suite Metasploit Nmap Telnet /usr/share/webshells/jsp/cmdjsp.jsp on port 8180 Metasploit

Tools Demo VNC Kali tools screenshot

Question and Answer