Presentation is loading. Please wait.

Presentation is loading. Please wait.

[blank page for bug work-around]

Similar presentations


Presentation on theme: "[blank page for bug work-around]"— Presentation transcript:

1 [blank page for bug work-around]

2 A CSCE 548 Student Presentation
KALI LINUX (an Overview of Tools) A CSCE 548 Student Presentation By Siddharth Pathak

3 A Debian derived Linux distribution
Mainly for Penetration Testing Contains several hundred tools (>600) Has a dedicated project for Android called Kali Linux NetHunter Mati Aharoni, Devon Kearns and Raphaël Hertzog are the core developers. Has only a small number of trusted dedicated repositories for security purposes

4 Types of Tools Kali linux has an official categorization of tools into following categories: Information Gathering Vulnerability Analysis Wireless Attacks Web Applications Exploitation Tools Forensic Tools Stress Testing Sniffing & Spoofing Password Attacks Maintaining Access Reverse Engineering Reporting Tools Hardware Hacking

5 Some popular Tools

6 Nmap Probing Computer Networks Creates a “map” of network
Finds Vulnerabilities & identifies open ports GUI version is Zenmap [image2]

7 Zed Attack Proxy (ZAP) Developed by OWASP Free, open source
Penetration Testing Tool Finds Vulnerabilities GUI [image3]

8 Kismet Network Detector Packet Sniffer IDS Works silently
(w/o sending any loggable packets) Screenshot [image4]

9 Metasploit Stimulate attacks IDS Anti-forensic Metasploit
Framework tool for executing exploit code Screenshot [image5]

10 KALI LINUX TOOLS

11 KALI LINUX TOOLS

12 Aircrack-ng One of the most popular tools for WEP/WPA/WPA2 cracking.
Predominantly performs Dictionary Attacks Capture packets and handshakes, de-authenticate connected clients Includes a new attack 'PTW' developed in 2007 Many GUI counterparts but this is command line Screenshot: [image6]

13 Wireshark Packet Analyzer Most popular network protocol
analyzer (arguably) Lets user put an NIC in promiscuous mode Screenthot [image7]

14 John The Ripper Command-line based password cracker
Primarily to detect Weak unix passwords Most popular because of it's speed GUI version Johny [image8]

15 Maltego Relationship Analysis Tool What is connected to who
Can explore links between people, social networks, organizations, web sites, Internet infrastructure, phrases and has tags on Social Media Produces graphical network diagrams [image9]

16 In Conclusion It is a great distro to get started with recreational hacking. It can be professionally used to perform security auditing or vulnerability testing. It is safe. (As long as you stay withing the confines of the law) It's easy to set up, and It's pretty cool. Just set up a Virtual Machine, boot it up from a USB and give it a whirl, maybe you'll find a new passion.

17 Image Sources: [image 1] https://www.kali.org/ [image 2] Reference [3]
[image 6] hacking-tools-in-kali-linux/ [image 7] By uploader - self-taken screenshot, GPL, [image 8] Reference [3] [image 9] Reference [3]

18 References: [1] https://www.kali.org/
[2] [3] top-10-security-tools-in-kali-linux html#slide1 [4] [5] [6] [7] [8] [9]

19 THANK YOU


Download ppt "[blank page for bug work-around]"

Similar presentations


Ads by Google