[blank page for bug work-around]
A CSCE 548 Student Presentation KALI LINUX (an Overview of Tools) A CSCE 548 Student Presentation By Siddharth Pathak
A Debian derived Linux distribution Mainly for Penetration Testing Contains several hundred tools (>600) Has a dedicated project for Android called Kali Linux NetHunter Mati Aharoni, Devon Kearns and Raphaël Hertzog are the core developers. Has only a small number of trusted dedicated repositories for security purposes
Types of Tools Kali linux has an official categorization of tools into following categories: Information Gathering Vulnerability Analysis Wireless Attacks Web Applications Exploitation Tools Forensic Tools Stress Testing Sniffing & Spoofing Password Attacks Maintaining Access Reverse Engineering Reporting Tools Hardware Hacking
Some popular Tools
Nmap Probing Computer Networks Creates a “map” of network Finds Vulnerabilities & identifies open ports GUI version is Zenmap [image2]
Zed Attack Proxy (ZAP) Developed by OWASP Free, open source Penetration Testing Tool Finds Vulnerabilities GUI [image3]
Kismet Network Detector Packet Sniffer IDS Works silently (w/o sending any loggable packets) Screenshot [image4]
Metasploit Stimulate attacks IDS Anti-forensic Metasploit Framework tool for executing exploit code Screenshot [image5]
KALI LINUX TOOLS
KALI LINUX TOOLS
Aircrack-ng One of the most popular tools for WEP/WPA/WPA2 cracking. Predominantly performs Dictionary Attacks Capture packets and handshakes, de-authenticate connected clients Includes a new attack 'PTW' developed in 2007 Many GUI counterparts but this is command line Screenshot: [image6]
Wireshark Packet Analyzer Most popular network protocol analyzer (arguably) Lets user put an NIC in promiscuous mode Screenthot [image7]
John The Ripper Command-line based password cracker Primarily to detect Weak unix passwords Most popular because of it's speed GUI version Johny [image8]
Maltego Relationship Analysis Tool What is connected to who Can explore links between people, social networks, organizations, web sites, Internet infrastructure, phrases and has tags on Social Media Produces graphical network diagrams [image9]
In Conclusion It is a great distro to get started with recreational hacking. It can be professionally used to perform security auditing or vulnerability testing. It is safe. (As long as you stay withing the confines of the law) It's easy to set up, and It's pretty cool. Just set up a Virtual Machine, boot it up from a USB and give it a whirl, maybe you'll find a new passion.
Image Sources: [image 1] https://www.kali.org/ [image 2] Reference [3] [image 6] http://www.hackingtutorials.org/wifi-hacking-tutorials/top-10-wifi- hacking-tools-in-kali-linux/ [image 7] By uploader - self-taken screenshot, GPL, https://commons.wikimedia.org/w/index.php?curid=4042536 [image 8] Reference [3] [image 9] Reference [3]
References: [1] https://www.kali.org/ [2] https://en.wikipedia.org/wiki/Kali_Linux [3] http://www.networkworld.com/article/2291215/security/security-139872- top-10-security-tools-in-kali-linux-1-0-6.html#slide1 [4] https://en.wikipedia.org/wiki/Kismet_(software) [5] https://en.wikipedia.org/wiki/Wireshark [6] https://en.wikipedia.org/wiki/John_the_Ripper [7] https://en.wikipedia.org/wiki/Metasploit_Project [8] https://en.wikipedia.org/wiki/Nmap [9] https://www.kali.org/kali-linux-nethunter/
THANK YOU