Download presentation
Presentation is loading. Please wait.
Published byMaud Wiggins Modified over 8 years ago
1
Kali Linux BY BLAZE STERLING
2
Roadmap What is Kali Linux Installing Kali Linux Included Tools In depth included tools Conclusion
3
What is Kali Linux? Advanced penetration testing and security auditing linux distribution 300+ build in penetration testing tools Free / Open source FHS (File Hierarchy Standard) compliant Secure development environment Spin off of Backtrack
4
Using Kali Linux Install to hard disk 10 GB disk space USB / CD-DVD Live USB Install 2GB capacity Win32 Disk Imager Android 2.1 + devices 5 GB free space Network install Virtual Machine Run in side another OS
5
Included Kali Tools Information Gathering Dnsdict6 Nmap Urlcrazy IDS/IPS (Intrusion Detection/Protection System) Fragrouter Network Scanners Dnmap Netdiscover Traffic Analysis intrace
6
Included tools continued Vulnerability Analysis Cisco tools Yersinia Web Vulnerability Scanner ProxyStrike Cadaver Wireless Attacks Bluelog Spooftooph Wireless Tools Aircrack
7
Information Gathering Tools DNSDICT6 Finds all sub-domains of a website or web server Enumerates all IPv4 and IPv6 addresses to extract dumps Sub-domains IP information Powerful for extracting sub domains that are restricted Tutorials Online Google Youtube
8
Information Gathering Tools NMap Security Scanner Gordon Lyon Discovers hosts and services on a computer network and creates a map of the network Special Packets Analyzes reponses Host discovery Service discovery Operating system detections
9
IDP / IPS Fragrouter Intercepts, Modifies, and rewrites traffic destined for a specified host Routes network traffic in a way that eludes IDS Uses Test IDS timeout and reassembly Test TCP/IP scrubbing Test firewalls Evade Passive OS fingerprinting
10
Network Scanners DNMap Framework for distributing nmap scans among many clients Client/Server architecture Server knows what to do Clients do it Clients work when server is offline Real time statistics of the clients and their targets Scans very large networks quickly
11
Traffic Analysis Intrace Works along the same lines as Fragrouter Enumerates IP hops exploiting TCP connections to display the path of packets over the network Network reconnaissance Who is connected to who Firewall bypassing
12
Vulnerability Analysis Cisco Auditing Tool Perl script that scans cisco routers for common vulnerabilities Default passwords, usernames Easy to guess names and passwords IOS bug history Hijack a router Test router security Password username
13
Web Vulnerability Scanner ProxyStrike Active web application proxy designed to find vulnerabilities while browsing a web application Mainly javascript Sql injection and XSS plugins Listens to port 8008 and analyzes all the parameters of applications running in the port for vulnerabilities
14
Wireless Attacks Bluelog Bluetooth scanner and logger with optional web front-end designed for site surveys and traffic monitoring One of the only ones with a UI Find devices with Bluetooth enabled Records logs of all traffic over Bluetooth
15
Wireless Tools Aircrack 802.11 WEP and WPA-PSK key cracking program that can recover keys once enough data packets have been captured Steal internet Gain unauthorized network access One of the fastest network key cracking softwares
16
Conclusion Security focused Linux Distribution 300+ security tools Spin off of popular backtrack Multiple ways to run Hard drive USB / Live CD Virtual Machine Detailed Look at some tools To many to cover them all
17
References http://www.hackingloops.com/2013/03/dnsdict6-hack-tool-tutorial- know-your-backtrack.html http://www.hackingloops.com/2013/03/dnsdict6-hack-tool-tutorial- know-your-backtrack.html http://www.kali.org/official-documentation/ http://www.kali.org/official-documentation/ http://zer0byte.com/2013/03/19/kali-linux-complete-tools-list- installation-screen-shots/ http://zer0byte.com/2013/03/19/kali-linux-complete-tools-list- installation-screen-shots/ http://en.wikipedia.org/wiki/Nmap http://en.wikipedia.org/wiki/Nmap http://www.monkey.org/~dugsong/fragroute/ http://www.monkey.org/~dugsong/fragroute/ http://santoshdudhade.blogspot.com/2012/10/cisco-auditing-tool- v1-perl-script.html http://santoshdudhade.blogspot.com/2012/10/cisco-auditing-tool- v1-perl-script.html
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.