Contact Form

 

Kali Intro

Finally a whole lot of serious hacking is gonna be on line on my newly designed blog.
Well do 3 series.
1 Kali series.
2 Metasploit.
3 Serious Hacks :P

So lets give it off with first and the most important series i see is KALI. 


SO WHAT IS KALI???

According to official kali website lets see what exactly kali is
a Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. Kali contains several hundred tools aimed at various information security tasks, such as Penetration Testing, Forensics and Reverse Engineering. Kali Linux is developed, funded and maintained by Offensive Security, a leading information security training company. Kali Linux was released on the 13th March, 2013 as a complete, top-to-bottom rebuild of BackTrack Linux, adhering completely to Debiandevelopment standards.

*.More than 600 penetration testing tools included:After reviewing every tool that was included in BackTrack, we eliminated a great number of tools that either simply did not work or which duplicated other tools that provided the same or similar functionality. Details on what’s included are on the Kali Toolssite.
*.Free (as in beer) and always will be:Kali Linux, like BackTrack, is completely free of charge and always will be. You will never, ever have to pay for Kali Linux.
*.Open source Git tree:We are committed to the open source development model and our development treeis available for all to see. All of the source code which goes into Kali Linux is available for anyone who wants to tweak or rebuild packagesto suit their specific needs.
*.FHS compliant:Kali adheres to the Filesystem Hierarchy Standard, allowing Linux users to easily locate binaries, support files, libraries, etc.
*.Wide-ranging wireless device support: A regular sticking point with Linux distributions has been supported for wireless interfaces. We have built Kali Linux to support as many wireless devices as we possibly can, allowing it to run properly on a wide variety of hardware and making it compatible with numerous USB and other wireless devices.
*.Custom kernel, patched for injection:As penetration testers, the development team often needs to do wireless assessments, so our kernel has the latest injection patches included.
*.Developed in a secure environment:The Kali Linux team is made up of a small group of individuals who are the only ones trusted to commit packages and interact with the repositories, all of which is done using multiple secure protocols.
*.GPG signed packages and repositories: Every package in Kali Linux is signed by each individual developer who built and committed it, and the repositories subsequently sign the packages as well. *.Multi-language support:Although penetration tools tend to be written in English, we have ensured that Kali includes true multilingual support, allowing more users to operate in their native language and locate the tools they need for the job.
*.Completely customizable:We thoroughly understand that not everyone will agree with our design decisions, so we have made it as easy as possible for our more adventurous users to customize Kali Linuxto their liking, all the way down to the kernel.
*.ARMEL and ARMHF support:Since ARM-based single-board systems like the Raspberry Pi and BeagleBone Black, among others, are becoming more and more prevalent and inexpensive, we knew that Kali’s ARM supportwould need to be as robust as we could manage, with fully working installations for both ARMEL and ARMHFsystems. Kali Linux is available on a wide range of ARM devicesand has ARM repositories integrated with the mainline distribution so tools for ARM are updated in conjunction with the rest of the distribution.

THE QUESTION NOW ARISES IS WHAT IS PENETRATION TESTING AND WHAT THE FUCK HAS A HACKER TO DO WITH IT?? 

 Pentration test/Pen test is actually a software driven test done in order to exploit a network/computer safely to get note of its vulnerabilites and correct them for proper working of our system.

HOW IS PEN TEST USEFUL TO A HACKER?? 

As stated earlier pen test is test to figure our the vulnerabilites and thats basics of hacking isn't it? If we know what are the 'hackable' areas of network we are half way through to it now all we need is to find an exploit and vanish the network off..

 SO THATS EXACTLY WHAT KALI IS AND NOW KALI IS BACK WITH ITS 2.0 VERSION EVEN MORE STEALTHIER AND HACKER.. NEXT POST WELL START WITH BOOTING OUR COMPUTER WITH KALI ND ALSO BEGIN WITH SOME WIFI HACKS AND PASSWORD ATTACK. STAY TECHIE hTI

Total comment

Author

Utsav Singla