Presentation is loading. Please wait.

Presentation is loading. Please wait.

Introduction to Kali Linux

Similar presentations


Presentation on theme: "Introduction to Kali Linux"— Presentation transcript:

1 Introduction to Kali Linux
by Lucas A. Rosevear and Peter Greko

2 Staying in Scope Attempting to compromise a system that you do not have explicit permission to attempt to compromise is illegal. Even penetration testers can also face charges if they go outside of the explicitly defined scope of the engagement. Only conduct testing on the specific functionality you have been given written permission to test, or on virtual machines that you control.

3 Agenda Who are we? What is Kali Linux? Live Demo Questions

4 Who are we? Security Consultants Network penetration testing
Application security Code review Etc.

5 Kali Linux Linux distro based on Debian
Security testing and computer forensics tools compilation. Ease of use Over 300 penetration testing programs Supports a variety of architectures. (including ARM) Used for compatibility Easy to expand. Portable. Flaws: Root access by design. Small set of repositories, adding new ones will probably break stuff. Not a beginner’s distro.

6 Alternatives to Kali Linux
Backbox Deft Matriux -Backbox- Free Open Source Community project with the aim to promote the culture of security in IT environment and give its contribute to make it better and safer. Stealth toolkit -Deft- Digital Evidence & Forensics Toolkit - based on GNU Linux -Matriux-  based on Debian consisting of a powerful bunch of more than 300 open source and free tools that can be used for various purposes including, but not limited to, penetration testing, ethical hacking, system and network administration, cyber forensics investigations, security testing, vulnerability analysis, and much more

7 Using Kali Linux Download Virtual Machine Installation
Virtual Machine Installation Machine-in-Virtual-Box

8 Demonstration of Kali Where to get it. How it boots up.
Kali Tools Screenshot

9 Kali Linux Tools EyeWitness Nmap Remmina Burp Suite Metasploit Nmap
Telnet /usr/share/webshells/jsp/cmdjsp.jsp on port 8180 Metasploit

10 Tools Demo VNC Kali tools screenshot

11 Question and Answer


Download ppt "Introduction to Kali Linux"

Similar presentations


Ads by Google