SlideShare a Scribd company logo
Presented by:
Mirza Taimoor Sultan Baig
Introduction
• Kali Linux is the most effective and widely used penetration testing tool in the world,
with penetration testers, forensics experts, reverse engineers, and vulnerability
assessors all using it.
• Kali Linux is a multi-platform solution that information security professionals and
hobbyists can use for free.
• Kali Linux includes a large number of resources for various information security
activities, including penetration testing, security research, computer forensics, and
reverse engineering.
Types of Software
There are two types of software
• Application software
• System software
Types of operating software
• Microsoft window
• Linix
• Unix
• Many more
Kali Linux Features
• More than600 penetration testing tools included
• Free (as in beer) and always will be
• Open Source Git tree
• FHS compliant
• Wide-ranging wireless device support
• Custom kernel, patched for injection
• Developed in a secure environment
• GPG signed packages and repositories
• Multi-language support
• Completely customizable
• ARMEL and ARMHF support
Should I Use Kali Linux?
Kali Linux is designed to meet the needs of penetration testing and security auditing
professionals. To accomplish this, Kali Linux has undergone a number of significant
changes to reflect these requirements:
Network services disabled by default :System hooks in Kali Linux disable network
services by default. These hooks allow us to install a variety of services on Kali Linux
while also ensuring that our distribution is stable by default, regardless of which
packages are installed. Additional networks, such as Bluetooth, are automatically
blacklisted.
Custom Linux kernel :Kali Linux makes use of an upstream kernel that has been
patched to enable wireless injection.
A minimal and trusted set of repositories: Given Kali Linux's priorities and objectives,
preserving the system's overall integrity is critical. With that in mind, the number of
upstream software sources used by Kali is held to a bare minimum. Many new Kali
users are tempted to expand their sources by adding more repositories. list, but you
run the risk of destroying your Kali Linux installation if you do so.
Hardware Required
• A minimum of 20GB disk space for the kalilinix
install.
• RAM for i386 and amd64 architectures, minimum 1GB
remmonded 2GB or more.
• CD-DVD Drive/USB boot support
Advantage and Disadvantage
Advantage
• The main disadvantage of kali linix is that is help us test penetrating legally, give us a
benefits to find out loop holes which serve as open entry points to our system.
• Basically helping us to safe than sorry.
• It is highly secure.
Disadvantage
• The disadvantage of this system is that it does not function like a normal OS and can not be
use as one.
• It gives a complete access an knowledge of penetration, that if not used wisely could have a
near disastrous effect.
kali linix
kali linix
Warning
• Use of these tools against a live website
for which you don’t have a permission , is
illegal and may land you in JAIL
IMPORTANT LAW
• 18 U.S. Code § 1029 -Fraud and related
activity in connection with access devices
• 18 U.S. Code § 1030 - Fraud and related
activity in connection with computers
kali linix

More Related Content

PPTX
Kali linux
Fa6ma_
 
PPTX
Kali linux
afraalfalasii
 
PPTX
Kali Linux
Chanchal Dabriya
 
PPTX
Kalilinux
almuhairi2000
 
PPTX
Firewall in Perl by Chankey Pathak
Chankey Pathak
 
PDF
Parrot Security OS | Introduction to Parrot Security OS | Cybersecurity Train...
Edureka!
 
PPTX
Shamsa altayer 10bg kali linux
shamsaot
 
PDF
Learn Ethical Hacking With Kali Linux | Ethical Hacking Tutorial | Kali Linux...
Edureka!
 
Kali linux
Fa6ma_
 
Kali linux
afraalfalasii
 
Kali Linux
Chanchal Dabriya
 
Kalilinux
almuhairi2000
 
Firewall in Perl by Chankey Pathak
Chankey Pathak
 
Parrot Security OS | Introduction to Parrot Security OS | Cybersecurity Train...
Edureka!
 
Shamsa altayer 10bg kali linux
shamsaot
 
Learn Ethical Hacking With Kali Linux | Ethical Hacking Tutorial | Kali Linux...
Edureka!
 

What's hot (20)

PDF
Maemo 6 Platform Security
Peter Schneider
 
PDF
Secure Application Development in the Age of Continuous Delivery
Black Duck by Synopsys
 
PPTX
Product Spotlight: Red Hat Enterprise Linux for Servers and Desktops
Aventis Systems, Inc.
 
PPTX
Kal i linux
shamsa222
 
PDF
Microservice et identité
Leonard Moustacchis
 
PDF
Practical Steps to Scale Legal Support for Open Source
Black Duck by Synopsys
 
PDF
PCI and Vulnerability Assessments - What’s Missing
Black Duck by Synopsys
 
PDF
Myths and Misperceptions of Open Source Security
Black Duck by Synopsys
 
PPT
Vp ns
Ayano Midakso
 
PDF
Integrating Black Duck into your Agile DevOps Environment
Black Duck by Synopsys
 
PDF
NTXISSACSC3 - Critical Criteria for (Cloud) Workload Security by Steve Armend...
North Texas Chapter of the ISSA
 
PDF
Customer Case Study: ScienceLogic - Many Paths to Compliance
Black Duck by Synopsys
 
PPT
Virtual Private Network
Greater Noida Institute Of Technology
 
PPTX
Security in the Age of Open Source
Black Duck by Synopsys
 
PPTX
Contain your risk: Deploy secure containers with trust and confidence
Black Duck by Synopsys
 
PPTX
Secure application deployment in Apache CloudStack
Tim Mackey
 
PDF
XML Interfaces to the popular Nessus Scanner
Network Intelligence India
 
PDF
CSF18 - BitLocker Deep Dive - Sami Laiho
NCCOMMS
 
PDF
CSF18 - The Night is Dark and Full of Hackers - Sami Laiho
NCCOMMS
 
Maemo 6 Platform Security
Peter Schneider
 
Secure Application Development in the Age of Continuous Delivery
Black Duck by Synopsys
 
Product Spotlight: Red Hat Enterprise Linux for Servers and Desktops
Aventis Systems, Inc.
 
Kal i linux
shamsa222
 
Microservice et identité
Leonard Moustacchis
 
Practical Steps to Scale Legal Support for Open Source
Black Duck by Synopsys
 
PCI and Vulnerability Assessments - What’s Missing
Black Duck by Synopsys
 
Myths and Misperceptions of Open Source Security
Black Duck by Synopsys
 
Integrating Black Duck into your Agile DevOps Environment
Black Duck by Synopsys
 
NTXISSACSC3 - Critical Criteria for (Cloud) Workload Security by Steve Armend...
North Texas Chapter of the ISSA
 
Customer Case Study: ScienceLogic - Many Paths to Compliance
Black Duck by Synopsys
 
Virtual Private Network
Greater Noida Institute Of Technology
 
Security in the Age of Open Source
Black Duck by Synopsys
 
Contain your risk: Deploy secure containers with trust and confidence
Black Duck by Synopsys
 
Secure application deployment in Apache CloudStack
Tim Mackey
 
XML Interfaces to the popular Nessus Scanner
Network Intelligence India
 
CSF18 - BitLocker Deep Dive - Sami Laiho
NCCOMMS
 
CSF18 - The Night is Dark and Full of Hackers - Sami Laiho
NCCOMMS
 
Ad

Similar to kali linix (20)

PDF
Operating system
KartikeyBanjara1
 
PPTX
linux.pptx
AudieMarAgpawa
 
PPTX
Kali presentation
Zain Ul abadin
 
PPTX
Kali linux.ppt
Ahmedalhassar1
 
PPTX
kalilinux.pptxfgfgfdgfdgfdgfdgfdfgfgfgfgfg
zmulani8
 
PPTX
Kalilinux
haha loser
 
PPTX
Kali Linux
Shubham Agrawal
 
DOCX
What is Kali Linux_ A Comprehensive Guide for Beginners.docx
Oscp Training
 
PPTX
kali linux
Darshan Dalwadi
 
PPTX
Kali Linux
Sumit Singh
 
PPTX
Kali Linux
Sumit Singh
 
DOCX
What is Kali Linux_ A Comprehensive Guide for Beginners (1).docx
Oscp Training
 
PPTX
Eliz seminar
henelpj
 
PPTX
Kali linux
Harsh Gor
 
PDF
Unleash the Power: How to Install Kali Linux With a Twist
FredReynolds2
 
DOCX
Operating project
ISMAT CH
 
PPTX
Kali linux
MaryamAlR
 
DOCX
Mastering Kali Linux_ A Comprehensive Guide for Beginners.docx
Oscp Training
 
DOCX
What is Kali Linux_ A Comprehensive Guide to Ethical Hacking.docx
Oscp Training
 
DOCX
Mastering Cybersecurity_ An In-Depth Look at Kali Linux Revealed.docx
Oscp Training
 
Operating system
KartikeyBanjara1
 
linux.pptx
AudieMarAgpawa
 
Kali presentation
Zain Ul abadin
 
Kali linux.ppt
Ahmedalhassar1
 
kalilinux.pptxfgfgfdgfdgfdgfdgfdfgfgfgfgfg
zmulani8
 
Kalilinux
haha loser
 
Kali Linux
Shubham Agrawal
 
What is Kali Linux_ A Comprehensive Guide for Beginners.docx
Oscp Training
 
kali linux
Darshan Dalwadi
 
Kali Linux
Sumit Singh
 
Kali Linux
Sumit Singh
 
What is Kali Linux_ A Comprehensive Guide for Beginners (1).docx
Oscp Training
 
Eliz seminar
henelpj
 
Kali linux
Harsh Gor
 
Unleash the Power: How to Install Kali Linux With a Twist
FredReynolds2
 
Operating project
ISMAT CH
 
Kali linux
MaryamAlR
 
Mastering Kali Linux_ A Comprehensive Guide for Beginners.docx
Oscp Training
 
What is Kali Linux_ A Comprehensive Guide to Ethical Hacking.docx
Oscp Training
 
Mastering Cybersecurity_ An In-Depth Look at Kali Linux Revealed.docx
Oscp Training
 
Ad

More from Mirza Baig (20)

PPTX
INVESTIGATING THE USE OF IMPEDANCE PLETHYSMOGRAPHY FOR DETECTING DECREASED BL...
Mirza Baig
 
PPTX
Hemodynamic monitor by using IPG Technique
Mirza Baig
 
PPTX
BIOMEDICAL SENSORS.pptx
Mirza Baig
 
PPT
Fingerprint Recognition
Mirza Baig
 
PPTX
Power Electronics
Mirza Baig
 
PPT
OPTICAL SENSORS AND THEIR APPLICATIONS
Mirza Baig
 
PPTX
wireshark
Mirza Baig
 
PPTX
Power Electronics
Mirza Baig
 
PPTX
GNU Radio
Mirza Baig
 
DOCX
Automatic Solar Vertical Car Parking
Mirza Baig
 
PPTX
state space modeling of electrical system
Mirza Baig
 
PPTX
optical sensor
Mirza Baig
 
PPTX
AUTOMATIC SOLAR VERTICAL CAR PARKING SYSTEM
Mirza Baig
 
PPTX
A Comprehensive Analysis of Forearm Impedance Plethysmography for the Maximal...
Mirza Baig
 
PPTX
Determination of Cardiac Output based on Minimally Invasive Impedance Plethys...
Mirza Baig
 
PPTX
BIO-ELECTRICAL IMPEDENCE PLETHYSMOGRAPHYDESIGNING AN EFFICIENT NON-INVASIVE E...
Mirza Baig
 
PPTX
Development of an Adaptive Multi-sensor to Prevent Venous Stasis
Mirza Baig
 
PPTX
Automatic digital-analog impedance plethysmography
Mirza Baig
 
PPTX
Automatic digital-analog impedance plethysmograph
Mirza Baig
 
PPTX
Wearable Belt With Built-In Textile Electrodes for Cardio—Respiratory Monitor...
Mirza Baig
 
INVESTIGATING THE USE OF IMPEDANCE PLETHYSMOGRAPHY FOR DETECTING DECREASED BL...
Mirza Baig
 
Hemodynamic monitor by using IPG Technique
Mirza Baig
 
BIOMEDICAL SENSORS.pptx
Mirza Baig
 
Fingerprint Recognition
Mirza Baig
 
Power Electronics
Mirza Baig
 
OPTICAL SENSORS AND THEIR APPLICATIONS
Mirza Baig
 
wireshark
Mirza Baig
 
Power Electronics
Mirza Baig
 
GNU Radio
Mirza Baig
 
Automatic Solar Vertical Car Parking
Mirza Baig
 
state space modeling of electrical system
Mirza Baig
 
optical sensor
Mirza Baig
 
AUTOMATIC SOLAR VERTICAL CAR PARKING SYSTEM
Mirza Baig
 
A Comprehensive Analysis of Forearm Impedance Plethysmography for the Maximal...
Mirza Baig
 
Determination of Cardiac Output based on Minimally Invasive Impedance Plethys...
Mirza Baig
 
BIO-ELECTRICAL IMPEDENCE PLETHYSMOGRAPHYDESIGNING AN EFFICIENT NON-INVASIVE E...
Mirza Baig
 
Development of an Adaptive Multi-sensor to Prevent Venous Stasis
Mirza Baig
 
Automatic digital-analog impedance plethysmography
Mirza Baig
 
Automatic digital-analog impedance plethysmograph
Mirza Baig
 
Wearable Belt With Built-In Textile Electrodes for Cardio—Respiratory Monitor...
Mirza Baig
 

Recently uploaded (20)

PPTX
business incubation centre aaaaaaaaaaaaaa
hodeeesite4
 
PPT
Ppt for engineering students application on field effect
lakshmi.ec
 
PDF
settlement FOR FOUNDATION ENGINEERS.pdf
Endalkazene
 
PDF
July 2025: Top 10 Read Articles Advanced Information Technology
ijait
 
DOCX
SAR - EEEfdfdsdasdsdasdasdasdasdasdasdasda.docx
Kanimozhi676285
 
PDF
오픈소스 LLM, vLLM으로 Production까지 (Instruct.KR Summer Meetup, 2025)
Hyogeun Oh
 
PPTX
ternal cell structure: leadership, steering
hodeeesite4
 
PDF
Unit I Part II.pdf : Security Fundamentals
Dr. Madhuri Jawale
 
PDF
Queuing formulas to evaluate throughputs and servers
gptshubham
 
PDF
Principles of Food Science and Nutritions
Dr. Yogesh Kumar Kosariya
 
PPT
1. SYSTEMS, ROLES, AND DEVELOPMENT METHODOLOGIES.ppt
zilow058
 
PDF
The Effect of Artifact Removal from EEG Signals on the Detection of Epileptic...
Partho Prosad
 
PDF
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
PPTX
AgentX UiPath Community Webinar series - Delhi
RohitRadhakrishnan8
 
PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PPTX
Victory Precisions_Supplier Profile.pptx
victoryprecisions199
 
PPTX
Chapter_Seven_Construction_Reliability_Elective_III_Msc CM
SubashKumarBhattarai
 
PDF
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 
PPTX
MSME 4.0 Template idea hackathon pdf to understand
alaudeenaarish
 
PPTX
MT Chapter 1.pptx- Magnetic particle testing
ABCAnyBodyCanRelax
 
business incubation centre aaaaaaaaaaaaaa
hodeeesite4
 
Ppt for engineering students application on field effect
lakshmi.ec
 
settlement FOR FOUNDATION ENGINEERS.pdf
Endalkazene
 
July 2025: Top 10 Read Articles Advanced Information Technology
ijait
 
SAR - EEEfdfdsdasdsdasdasdasdasdasdasdasda.docx
Kanimozhi676285
 
오픈소스 LLM, vLLM으로 Production까지 (Instruct.KR Summer Meetup, 2025)
Hyogeun Oh
 
ternal cell structure: leadership, steering
hodeeesite4
 
Unit I Part II.pdf : Security Fundamentals
Dr. Madhuri Jawale
 
Queuing formulas to evaluate throughputs and servers
gptshubham
 
Principles of Food Science and Nutritions
Dr. Yogesh Kumar Kosariya
 
1. SYSTEMS, ROLES, AND DEVELOPMENT METHODOLOGIES.ppt
zilow058
 
The Effect of Artifact Removal from EEG Signals on the Detection of Epileptic...
Partho Prosad
 
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
AgentX UiPath Community Webinar series - Delhi
RohitRadhakrishnan8
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
Victory Precisions_Supplier Profile.pptx
victoryprecisions199
 
Chapter_Seven_Construction_Reliability_Elective_III_Msc CM
SubashKumarBhattarai
 
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 
MSME 4.0 Template idea hackathon pdf to understand
alaudeenaarish
 
MT Chapter 1.pptx- Magnetic particle testing
ABCAnyBodyCanRelax
 

kali linix

  • 2. Introduction • Kali Linux is the most effective and widely used penetration testing tool in the world, with penetration testers, forensics experts, reverse engineers, and vulnerability assessors all using it. • Kali Linux is a multi-platform solution that information security professionals and hobbyists can use for free. • Kali Linux includes a large number of resources for various information security activities, including penetration testing, security research, computer forensics, and reverse engineering.
  • 3. Types of Software There are two types of software • Application software • System software Types of operating software • Microsoft window • Linix • Unix • Many more
  • 4. Kali Linux Features • More than600 penetration testing tools included • Free (as in beer) and always will be • Open Source Git tree • FHS compliant • Wide-ranging wireless device support • Custom kernel, patched for injection • Developed in a secure environment • GPG signed packages and repositories • Multi-language support • Completely customizable • ARMEL and ARMHF support
  • 5. Should I Use Kali Linux? Kali Linux is designed to meet the needs of penetration testing and security auditing professionals. To accomplish this, Kali Linux has undergone a number of significant changes to reflect these requirements: Network services disabled by default :System hooks in Kali Linux disable network services by default. These hooks allow us to install a variety of services on Kali Linux while also ensuring that our distribution is stable by default, regardless of which packages are installed. Additional networks, such as Bluetooth, are automatically blacklisted. Custom Linux kernel :Kali Linux makes use of an upstream kernel that has been patched to enable wireless injection. A minimal and trusted set of repositories: Given Kali Linux's priorities and objectives, preserving the system's overall integrity is critical. With that in mind, the number of upstream software sources used by Kali is held to a bare minimum. Many new Kali
  • 6. users are tempted to expand their sources by adding more repositories. list, but you run the risk of destroying your Kali Linux installation if you do so.
  • 7. Hardware Required • A minimum of 20GB disk space for the kalilinix install. • RAM for i386 and amd64 architectures, minimum 1GB remmonded 2GB or more. • CD-DVD Drive/USB boot support
  • 8. Advantage and Disadvantage Advantage • The main disadvantage of kali linix is that is help us test penetrating legally, give us a benefits to find out loop holes which serve as open entry points to our system. • Basically helping us to safe than sorry. • It is highly secure. Disadvantage • The disadvantage of this system is that it does not function like a normal OS and can not be use as one. • It gives a complete access an knowledge of penetration, that if not used wisely could have a near disastrous effect.
  • 11. Warning • Use of these tools against a live website for which you don’t have a permission , is illegal and may land you in JAIL IMPORTANT LAW • 18 U.S. Code § 1029 -Fraud and related activity in connection with access devices • 18 U.S. Code § 1030 - Fraud and related activity in connection with computers