SlideShare a Scribd company logo
Seminar On
Penetration Test Using Kali Linux
Submitted by
NAME : NAIK ABHAY SURESH
USN: 2JI15CS025
Guided by: Dr. Dinesha. H. A
CONTENTS
1. Introduction To Kali Linux
2. Introduction To Penetration Test
3. Literature Survey
4. Methodology
5. Advantages
6. Applications
7. Conclusion
8. References
Introduction
 Kali Linux is a Debian-based Linux distribution aimed
at advanced Penetration Testing and Security Auditing
services.
 Kali is packed with the tools which helps in achieving
goals towards various information security tasks, such as
Penetration Testing, Security research, Computer
Forensics and Reverse Engineering etc.
Introduction to Penetration
 Penetration Testing is the process of simulating attacks (on
purpose) on the system that needs to be flawed-free (i.e., there
should not be any holes) in order to stop a hacker or attacker to
follow out an attack along the organization.
 It deals with most of common things that usually a developer
forgets to cover during the development process. But, by the
magic of Penetration Testing it is possible to remove such kind
of holes in the application or in any system.
Literature Survey
 Devanshu Bhatt in his work on Modern Day Penetration
Testing Distribution Open Source Platform Kali Linux,
concluded that By utilizing Kali Linux–Open source
Distribution Framework and number of applications it supports
like Dmitry and Metasploit, he’s been able to get access on the
target Debian Linux machine. Kali Linux's Dmitry and
Metasploit Framework offers significant variety of exploits with
the collection of all operating system with available versions
and service packs.
METHODOLOGY
 Basically, the overall process of penetration testing can be
carved up into a no. of steps that make an inclusive
methodology of penetration testing
The phases of penetration testing are as follows:
 Information Gathering
 Scanning
 Exploitation
 Post Exploitation & Maintaining Access
Information Gathering
 This phase needs patience and lots of time, this phase generates
a massive amount of information about the target. The main
motto of Information Gathering is to collect as much
information as possible on the target. Kali Linux provides a
variety of tools for gathering information about the target.
Scanning
 This stage is the most important phase where the pen-tester
needs to identify the exposures of the target. This can be also
referred to as “Vulnerability Assessment”. The pen-tester uses
different tools and utilities to reveal the holes in the services,
ports and applications running on the host. Some kali linux
tools for Scanning are Webshag and Vega
Exploitation
 This process is nothing but the Exploitation process. In simple
words gaining access to the target using its vulnerabilities.
Exploitation delivers the payloads on the target in order to
forcefully grant the access into the target. There are different
types of exploits available over the Internet, but the widely
used is the “Metasploit Project”.
Post Exploitation
 This phase plays a crucial role in the penetration testing
process. Maintaining access to the target after the exploitation
is a very serious activity and needs to done carefully. in order
to achieve this “backdoors” are required to be created and
needs to be loaded on the target. Backdoors are nothing but a
piece of software that allows the unauthorized user to get into
the target at any time.
Why use Kali?
 It is FREE!!!!!
 300+ applications, from password crackers to digital forensics
software.
 Vast wireless device support (ARM processors).
 Completely Customizable.
 Multilingual Support.
 Secure Development Environment.
 Open source Git tree.
 Filesystem Hierarchy Standard (FHS) Compliant.
Application Menu
 Information Gathering
 Vulnerability Analysis
 Web Application Analysis
 Database Assessment
 Password Attacks
 Wireless Attacks
 Forensics
 Etc.
penetration test using Kali linux ppt
CONCLUSION
 Kali Linux is proved to be very useful and completely free
Operating System that can be used for the penetration testing.
 Penetration testing requires lots of time and patience to get the
results and to get them repaired. The Kali is a tool for the Linux
users to provide them numerous tricks in the security
department.
 Kali is packed with the tools which helps in achieving goals
towards various information security tasks, such as Penetration
Testing.
References
 Devanshu Bhatt’s paper on Modern Day Penetration Testing Distribution Open
Source Platform -Kali Linux. International journal of scientific & technology
research volume 7, issue 4 , April 2018.
 Gurdeep Singh and Jaswinder Singh’s paper on Evaluation of Penetration
Testing Tools of KALI LINUX. International Journal of Innovations &
Advancement in Computer Science IJIACS ISSN 2347 – 8616 Volume 5, Issue 9,
September 2016.
 Matthew Denis, Carlos Zena and Thaier Hayajneh’s paper on Penetration
Testing: Attack Methods, and Defence Strategies. IEEE paper, 29 April 2016.
 Suraj S. Mundalik’s paper on Penetration Testing: An Art of Securing the
System (Using Kali Linux). International Journal of Advanced Research in
Computer Science and Software Engineering Volume 5, Issue 10, October-2016.
 Kali Linux Revealed “Mastering the Penetration Testing Distribution” text
book by Raphaël Hertzog, Jim O’Gorman and Mati Aharoni 2017.
THANK YOU
Ad

More Related Content

What's hot (20)

Kali presentation
Kali presentationKali presentation
Kali presentation
Zain Ul abadin
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testing
Nezar Alazzabi
 
Metasploit framwork
Metasploit framworkMetasploit framwork
Metasploit framwork
Deepanshu Gajbhiye
 
Kali Linux
Kali LinuxKali Linux
Kali Linux
Sumit Singh
 
Kali linux
Kali linuxKali linux
Kali linux
Harsh Gor
 
MITRE ATT&CK Framework
MITRE ATT&CK FrameworkMITRE ATT&CK Framework
MITRE ATT&CK Framework
n|u - The Open Security Community
 
OpenVAS
OpenVASOpenVAS
OpenVAS
svm
 
Introduction To Exploitation & Metasploit
Introduction To Exploitation & MetasploitIntroduction To Exploitation & Metasploit
Introduction To Exploitation & Metasploit
Raghav Bisht
 
Web Application Penetration Testing
Web Application Penetration Testing Web Application Penetration Testing
Web Application Penetration Testing
Priyanka Aash
 
penetration test using Kali linux seminar report
penetration test using Kali linux seminar reportpenetration test using Kali linux seminar report
penetration test using Kali linux seminar report
AbhayNaik8
 
Introduction to Metasploit
Introduction to MetasploitIntroduction to Metasploit
Introduction to Metasploit
GTU
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
Rahmat Suhatman
 
Malware Static Analysis
Malware Static AnalysisMalware Static Analysis
Malware Static Analysis
Hossein Yavari
 
Kali linux tutorial
Kali linux tutorialKali linux tutorial
Kali linux tutorial
HarikaReddy115
 
Cyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metricsCyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metrics
Mark Arena
 
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Edureka!
 
OWASP Top 10 2021 Presentation (Jul 2022)
OWASP Top 10 2021 Presentation (Jul 2022)OWASP Top 10 2021 Presentation (Jul 2022)
OWASP Top 10 2021 Presentation (Jul 2022)
TzahiArabov
 
Penetration testing reporting and methodology
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodology
Rashad Aliyev
 
Putting MITRE ATT&CK into Action with What You Have, Where You Are
Putting MITRE ATT&CK into Action with What You Have, Where You ArePutting MITRE ATT&CK into Action with What You Have, Where You Are
Putting MITRE ATT&CK into Action with What You Have, Where You Are
Katie Nickels
 
kali linux Presentaion
 kali linux Presentaion kali linux Presentaion
kali linux Presentaion
Dev Gandhi
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testing
Nezar Alazzabi
 
OpenVAS
OpenVASOpenVAS
OpenVAS
svm
 
Introduction To Exploitation & Metasploit
Introduction To Exploitation & MetasploitIntroduction To Exploitation & Metasploit
Introduction To Exploitation & Metasploit
Raghav Bisht
 
Web Application Penetration Testing
Web Application Penetration Testing Web Application Penetration Testing
Web Application Penetration Testing
Priyanka Aash
 
penetration test using Kali linux seminar report
penetration test using Kali linux seminar reportpenetration test using Kali linux seminar report
penetration test using Kali linux seminar report
AbhayNaik8
 
Introduction to Metasploit
Introduction to MetasploitIntroduction to Metasploit
Introduction to Metasploit
GTU
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
Rahmat Suhatman
 
Malware Static Analysis
Malware Static AnalysisMalware Static Analysis
Malware Static Analysis
Hossein Yavari
 
Cyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metricsCyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metrics
Mark Arena
 
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Edureka!
 
OWASP Top 10 2021 Presentation (Jul 2022)
OWASP Top 10 2021 Presentation (Jul 2022)OWASP Top 10 2021 Presentation (Jul 2022)
OWASP Top 10 2021 Presentation (Jul 2022)
TzahiArabov
 
Penetration testing reporting and methodology
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodology
Rashad Aliyev
 
Putting MITRE ATT&CK into Action with What You Have, Where You Are
Putting MITRE ATT&CK into Action with What You Have, Where You ArePutting MITRE ATT&CK into Action with What You Have, Where You Are
Putting MITRE ATT&CK into Action with What You Have, Where You Are
Katie Nickels
 
kali linux Presentaion
 kali linux Presentaion kali linux Presentaion
kali linux Presentaion
Dev Gandhi
 

Similar to penetration test using Kali linux ppt (20)

Using Kali Linux for Penetration Testing_ A Comprehensive Guide.docx
Using Kali Linux for Penetration Testing_ A Comprehensive Guide.docxUsing Kali Linux for Penetration Testing_ A Comprehensive Guide.docx
Using Kali Linux for Penetration Testing_ A Comprehensive Guide.docx
Oscp Training
 
Harness the Power of Kali Linux Tools for Cybersecurity.docx
Harness the Power of Kali Linux Tools for Cybersecurity.docxHarness the Power of Kali Linux Tools for Cybersecurity.docx
Harness the Power of Kali Linux Tools for Cybersecurity.docx
Oscp Training
 
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET- Penetration Testing using Metasploit Framework: An Ethical ApproachIRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET Journal
 
Mastering Penetration Testing with Kali Linux.docx
Mastering Penetration Testing with Kali Linux.docxMastering Penetration Testing with Kali Linux.docx
Mastering Penetration Testing with Kali Linux.docx
Oscp Training
 
A Comparison Study of Open Source Penetration Testing Tools
A Comparison Study of Open Source Penetration Testing ToolsA Comparison Study of Open Source Penetration Testing Tools
A Comparison Study of Open Source Penetration Testing Tools
ijtsrd
 
Unveiling PEN-200_ Penetration Testing with Kali Linux for 2025.docx
Unveiling PEN-200_ Penetration Testing with Kali Linux for 2025.docxUnveiling PEN-200_ Penetration Testing with Kali Linux for 2025.docx
Unveiling PEN-200_ Penetration Testing with Kali Linux for 2025.docx
Oscp Training
 
Metaploit
MetaploitMetaploit
Metaploit
Ajinkya Pathak
 
kali linux.pptx
kali linux.pptxkali linux.pptx
kali linux.pptx
AdityaKumar1548
 
What is Kali Linux_ A Comprehensive Guide to Ethical Hacking.docx
What is Kali Linux_ A Comprehensive Guide to Ethical Hacking.docxWhat is Kali Linux_ A Comprehensive Guide to Ethical Hacking.docx
What is Kali Linux_ A Comprehensive Guide to Ethical Hacking.docx
Oscp Training
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
abh.arya
 
Eliz seminar
Eliz seminar Eliz seminar
Eliz seminar
henelpj
 
Mastering Penetration Testing Using Kali Linux_ A Complete Guide.docx
Mastering Penetration Testing Using Kali Linux_ A Complete Guide.docxMastering Penetration Testing Using Kali Linux_ A Complete Guide.docx
Mastering Penetration Testing Using Kali Linux_ A Complete Guide.docx
Oscp Training
 
Finalppt metasploit
Finalppt metasploitFinalppt metasploit
Finalppt metasploit
devilback
 
Software Security Assurance for DevOps
Software Security Assurance for DevOpsSoftware Security Assurance for DevOps
Software Security Assurance for DevOps
Black Duck by Synopsys
 
Penetration testing tools and phases
Penetration testing tools and phasesPenetration testing tools and phases
Penetration testing tools and phases
TestingXperts
 
What is Kali Linux_ A Comprehensive Guide for Beginners (1).docx
What is Kali Linux_ A Comprehensive Guide for Beginners (1).docxWhat is Kali Linux_ A Comprehensive Guide for Beginners (1).docx
What is Kali Linux_ A Comprehensive Guide for Beginners (1).docx
Oscp Training
 
Cybersecurity Free Tools for Practice Project.pdf
Cybersecurity Free Tools for Practice Project.pdfCybersecurity Free Tools for Practice Project.pdf
Cybersecurity Free Tools for Practice Project.pdf
Haris Chughtai
 
(03 2013) guide to kali linux
(03 2013)   guide to kali linux(03 2013)   guide to kali linux
(03 2013) guide to kali linux
julius77
 
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Mobodexter
 
kalilinux.pptxfgfgfdgfdgfdgfdgfdfgfgfgfgfg
kalilinux.pptxfgfgfdgfdgfdgfdgfdfgfgfgfgfgkalilinux.pptxfgfgfdgfdgfdgfdgfdfgfgfgfgfg
kalilinux.pptxfgfgfdgfdgfdgfdgfdfgfgfgfgfg
zmulani8
 
Using Kali Linux for Penetration Testing_ A Comprehensive Guide.docx
Using Kali Linux for Penetration Testing_ A Comprehensive Guide.docxUsing Kali Linux for Penetration Testing_ A Comprehensive Guide.docx
Using Kali Linux for Penetration Testing_ A Comprehensive Guide.docx
Oscp Training
 
Harness the Power of Kali Linux Tools for Cybersecurity.docx
Harness the Power of Kali Linux Tools for Cybersecurity.docxHarness the Power of Kali Linux Tools for Cybersecurity.docx
Harness the Power of Kali Linux Tools for Cybersecurity.docx
Oscp Training
 
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET- Penetration Testing using Metasploit Framework: An Ethical ApproachIRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET Journal
 
Mastering Penetration Testing with Kali Linux.docx
Mastering Penetration Testing with Kali Linux.docxMastering Penetration Testing with Kali Linux.docx
Mastering Penetration Testing with Kali Linux.docx
Oscp Training
 
A Comparison Study of Open Source Penetration Testing Tools
A Comparison Study of Open Source Penetration Testing ToolsA Comparison Study of Open Source Penetration Testing Tools
A Comparison Study of Open Source Penetration Testing Tools
ijtsrd
 
Unveiling PEN-200_ Penetration Testing with Kali Linux for 2025.docx
Unveiling PEN-200_ Penetration Testing with Kali Linux for 2025.docxUnveiling PEN-200_ Penetration Testing with Kali Linux for 2025.docx
Unveiling PEN-200_ Penetration Testing with Kali Linux for 2025.docx
Oscp Training
 
What is Kali Linux_ A Comprehensive Guide to Ethical Hacking.docx
What is Kali Linux_ A Comprehensive Guide to Ethical Hacking.docxWhat is Kali Linux_ A Comprehensive Guide to Ethical Hacking.docx
What is Kali Linux_ A Comprehensive Guide to Ethical Hacking.docx
Oscp Training
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
abh.arya
 
Eliz seminar
Eliz seminar Eliz seminar
Eliz seminar
henelpj
 
Mastering Penetration Testing Using Kali Linux_ A Complete Guide.docx
Mastering Penetration Testing Using Kali Linux_ A Complete Guide.docxMastering Penetration Testing Using Kali Linux_ A Complete Guide.docx
Mastering Penetration Testing Using Kali Linux_ A Complete Guide.docx
Oscp Training
 
Finalppt metasploit
Finalppt metasploitFinalppt metasploit
Finalppt metasploit
devilback
 
Software Security Assurance for DevOps
Software Security Assurance for DevOpsSoftware Security Assurance for DevOps
Software Security Assurance for DevOps
Black Duck by Synopsys
 
Penetration testing tools and phases
Penetration testing tools and phasesPenetration testing tools and phases
Penetration testing tools and phases
TestingXperts
 
What is Kali Linux_ A Comprehensive Guide for Beginners (1).docx
What is Kali Linux_ A Comprehensive Guide for Beginners (1).docxWhat is Kali Linux_ A Comprehensive Guide for Beginners (1).docx
What is Kali Linux_ A Comprehensive Guide for Beginners (1).docx
Oscp Training
 
Cybersecurity Free Tools for Practice Project.pdf
Cybersecurity Free Tools for Practice Project.pdfCybersecurity Free Tools for Practice Project.pdf
Cybersecurity Free Tools for Practice Project.pdf
Haris Chughtai
 
(03 2013) guide to kali linux
(03 2013)   guide to kali linux(03 2013)   guide to kali linux
(03 2013) guide to kali linux
julius77
 
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Mobodexter
 
kalilinux.pptxfgfgfdgfdgfdgfdgfdfgfgfgfgfg
kalilinux.pptxfgfgfdgfdgfdgfdgfdfgfgfgfgfgkalilinux.pptxfgfgfdgfdgfdgfdgfdfgfgfgfgfg
kalilinux.pptxfgfgfdgfdgfdgfdgfdfgfgfgfgfg
zmulani8
 
Ad

Recently uploaded (20)

15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...
IJCSES Journal
 
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Journal of Soft Computing in Civil Engineering
 
theory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptxtheory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptx
sanchezvanessa7896
 
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptxLidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
RishavKumar530754
 
Machine learning project on employee attrition detection using (2).pptx
Machine learning project on employee attrition detection using (2).pptxMachine learning project on employee attrition detection using (2).pptx
Machine learning project on employee attrition detection using (2).pptx
rajeswari89780
 
some basics electrical and electronics knowledge
some basics electrical and electronics knowledgesome basics electrical and electronics knowledge
some basics electrical and electronics knowledge
nguyentrungdo88
 
Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...
Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...
Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...
Journal of Soft Computing in Civil Engineering
 
The Gaussian Process Modeling Module in UQLab
The Gaussian Process Modeling Module in UQLabThe Gaussian Process Modeling Module in UQLab
The Gaussian Process Modeling Module in UQLab
Journal of Soft Computing in Civil Engineering
 
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G..."Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
Infopitaara
 
Data Structures_Introduction to algorithms.pptx
Data Structures_Introduction to algorithms.pptxData Structures_Introduction to algorithms.pptx
Data Structures_Introduction to algorithms.pptx
RushaliDeshmukh2
 
DSP and MV the Color image processing.ppt
DSP and MV the  Color image processing.pptDSP and MV the  Color image processing.ppt
DSP and MV the Color image processing.ppt
HafizAhamed8
 
Compiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptxCompiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptx
RushaliDeshmukh2
 
Avnet Silica's PCIM 2025 Highlights Flyer
Avnet Silica's PCIM 2025 Highlights FlyerAvnet Silica's PCIM 2025 Highlights Flyer
Avnet Silica's PCIM 2025 Highlights Flyer
WillDavies22
 
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITYADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ijscai
 
fluke dealers in bangalore..............
fluke dealers in bangalore..............fluke dealers in bangalore..............
fluke dealers in bangalore..............
Haresh Vaswani
 
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E..."Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
Infopitaara
 
Development of MLR, ANN and ANFIS Models for Estimation of PCUs at Different ...
Development of MLR, ANN and ANFIS Models for Estimation of PCUs at Different ...Development of MLR, ANN and ANFIS Models for Estimation of PCUs at Different ...
Development of MLR, ANN and ANFIS Models for Estimation of PCUs at Different ...
Journal of Soft Computing in Civil Engineering
 
Raish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdfRaish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdf
RaishKhanji
 
Introduction to Zoomlion Earthmoving.pptx
Introduction to Zoomlion Earthmoving.pptxIntroduction to Zoomlion Earthmoving.pptx
Introduction to Zoomlion Earthmoving.pptx
AS1920
 
Value Stream Mapping Worskshops for Intelligent Continuous Security
Value Stream Mapping Worskshops for Intelligent Continuous SecurityValue Stream Mapping Worskshops for Intelligent Continuous Security
Value Stream Mapping Worskshops for Intelligent Continuous Security
Marc Hornbeek
 
15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...
IJCSES Journal
 
theory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptxtheory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptx
sanchezvanessa7896
 
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptxLidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
RishavKumar530754
 
Machine learning project on employee attrition detection using (2).pptx
Machine learning project on employee attrition detection using (2).pptxMachine learning project on employee attrition detection using (2).pptx
Machine learning project on employee attrition detection using (2).pptx
rajeswari89780
 
some basics electrical and electronics knowledge
some basics electrical and electronics knowledgesome basics electrical and electronics knowledge
some basics electrical and electronics knowledge
nguyentrungdo88
 
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G..."Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
Infopitaara
 
Data Structures_Introduction to algorithms.pptx
Data Structures_Introduction to algorithms.pptxData Structures_Introduction to algorithms.pptx
Data Structures_Introduction to algorithms.pptx
RushaliDeshmukh2
 
DSP and MV the Color image processing.ppt
DSP and MV the  Color image processing.pptDSP and MV the  Color image processing.ppt
DSP and MV the Color image processing.ppt
HafizAhamed8
 
Compiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptxCompiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptx
RushaliDeshmukh2
 
Avnet Silica's PCIM 2025 Highlights Flyer
Avnet Silica's PCIM 2025 Highlights FlyerAvnet Silica's PCIM 2025 Highlights Flyer
Avnet Silica's PCIM 2025 Highlights Flyer
WillDavies22
 
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITYADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ijscai
 
fluke dealers in bangalore..............
fluke dealers in bangalore..............fluke dealers in bangalore..............
fluke dealers in bangalore..............
Haresh Vaswani
 
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E..."Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
Infopitaara
 
Raish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdfRaish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdf
RaishKhanji
 
Introduction to Zoomlion Earthmoving.pptx
Introduction to Zoomlion Earthmoving.pptxIntroduction to Zoomlion Earthmoving.pptx
Introduction to Zoomlion Earthmoving.pptx
AS1920
 
Value Stream Mapping Worskshops for Intelligent Continuous Security
Value Stream Mapping Worskshops for Intelligent Continuous SecurityValue Stream Mapping Worskshops for Intelligent Continuous Security
Value Stream Mapping Worskshops for Intelligent Continuous Security
Marc Hornbeek
 
Ad

penetration test using Kali linux ppt

  • 1. Seminar On Penetration Test Using Kali Linux Submitted by NAME : NAIK ABHAY SURESH USN: 2JI15CS025 Guided by: Dr. Dinesha. H. A
  • 2. CONTENTS 1. Introduction To Kali Linux 2. Introduction To Penetration Test 3. Literature Survey 4. Methodology 5. Advantages 6. Applications 7. Conclusion 8. References
  • 3. Introduction  Kali Linux is a Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing services.  Kali is packed with the tools which helps in achieving goals towards various information security tasks, such as Penetration Testing, Security research, Computer Forensics and Reverse Engineering etc.
  • 4. Introduction to Penetration  Penetration Testing is the process of simulating attacks (on purpose) on the system that needs to be flawed-free (i.e., there should not be any holes) in order to stop a hacker or attacker to follow out an attack along the organization.  It deals with most of common things that usually a developer forgets to cover during the development process. But, by the magic of Penetration Testing it is possible to remove such kind of holes in the application or in any system.
  • 5. Literature Survey  Devanshu Bhatt in his work on Modern Day Penetration Testing Distribution Open Source Platform Kali Linux, concluded that By utilizing Kali Linux–Open source Distribution Framework and number of applications it supports like Dmitry and Metasploit, he’s been able to get access on the target Debian Linux machine. Kali Linux's Dmitry and Metasploit Framework offers significant variety of exploits with the collection of all operating system with available versions and service packs.
  • 6. METHODOLOGY  Basically, the overall process of penetration testing can be carved up into a no. of steps that make an inclusive methodology of penetration testing The phases of penetration testing are as follows:  Information Gathering  Scanning  Exploitation  Post Exploitation & Maintaining Access
  • 7. Information Gathering  This phase needs patience and lots of time, this phase generates a massive amount of information about the target. The main motto of Information Gathering is to collect as much information as possible on the target. Kali Linux provides a variety of tools for gathering information about the target. Scanning  This stage is the most important phase where the pen-tester needs to identify the exposures of the target. This can be also referred to as “Vulnerability Assessment”. The pen-tester uses different tools and utilities to reveal the holes in the services, ports and applications running on the host. Some kali linux tools for Scanning are Webshag and Vega
  • 8. Exploitation  This process is nothing but the Exploitation process. In simple words gaining access to the target using its vulnerabilities. Exploitation delivers the payloads on the target in order to forcefully grant the access into the target. There are different types of exploits available over the Internet, but the widely used is the “Metasploit Project”. Post Exploitation  This phase plays a crucial role in the penetration testing process. Maintaining access to the target after the exploitation is a very serious activity and needs to done carefully. in order to achieve this “backdoors” are required to be created and needs to be loaded on the target. Backdoors are nothing but a piece of software that allows the unauthorized user to get into the target at any time.
  • 9. Why use Kali?  It is FREE!!!!!  300+ applications, from password crackers to digital forensics software.  Vast wireless device support (ARM processors).  Completely Customizable.  Multilingual Support.  Secure Development Environment.  Open source Git tree.  Filesystem Hierarchy Standard (FHS) Compliant.
  • 10. Application Menu  Information Gathering  Vulnerability Analysis  Web Application Analysis  Database Assessment  Password Attacks  Wireless Attacks  Forensics  Etc.
  • 12. CONCLUSION  Kali Linux is proved to be very useful and completely free Operating System that can be used for the penetration testing.  Penetration testing requires lots of time and patience to get the results and to get them repaired. The Kali is a tool for the Linux users to provide them numerous tricks in the security department.  Kali is packed with the tools which helps in achieving goals towards various information security tasks, such as Penetration Testing.
  • 13. References  Devanshu Bhatt’s paper on Modern Day Penetration Testing Distribution Open Source Platform -Kali Linux. International journal of scientific & technology research volume 7, issue 4 , April 2018.  Gurdeep Singh and Jaswinder Singh’s paper on Evaluation of Penetration Testing Tools of KALI LINUX. International Journal of Innovations & Advancement in Computer Science IJIACS ISSN 2347 – 8616 Volume 5, Issue 9, September 2016.  Matthew Denis, Carlos Zena and Thaier Hayajneh’s paper on Penetration Testing: Attack Methods, and Defence Strategies. IEEE paper, 29 April 2016.  Suraj S. Mundalik’s paper on Penetration Testing: An Art of Securing the System (Using Kali Linux). International Journal of Advanced Research in Computer Science and Software Engineering Volume 5, Issue 10, October-2016.  Kali Linux Revealed “Mastering the Penetration Testing Distribution” text book by Raphaël Hertzog, Jim O’Gorman and Mati Aharoni 2017.