Kali linux

9
Kali Linux Presented by: Alia Bin Touq and Afra al Falasi

Transcript of Kali linux

Page 1: Kali linux

Kali LinuxPresented by: Alia Bin Touq and Afra al Falasi

Page 2: Kali linux

Content Page

1. What is Kali? 2. Development3. Supported platforms4. Features5. Popular Culture6. Security-focused operating system

Page 3: Kali linux

What is Kali?

Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. It is maintained and funded by Offensive Security Ltd. Mati Aharoni, Devon Kearns and Raphaël Hertzog are the core developers.

Page 4: Kali linux

DevelopmentKali Linux is preinstalled with over 600 penetration-testing programs.

Kali Linux is based on Debian Jessie. Most packages Kali uses are imported from the Debian repositories. Kali Linux is developed in a secure location with only a small number of trusted people that are allowed to commit packages, with each package being signed by the developer.

Page 5: Kali linux

Supported platforms

Kali Linux is distributed in 32- and 64-bit images for use on hosts based on the x86 instruction set and as an image for the ARM architecture for use on the BeagleBoard computer and on Samsung's ARM Chromebook.

Page 6: Kali linux

FeaturesKali Linux has a dedicated project set-aside for compatibility and porting to specific Android devices, called Kali Linux NetHunter. It is the first Open Source Android penetration testing platform for Nexus devices, created as a joint effort between the Kali community member “BinkyBear” and Offensive Security. It supports Wireless 802.11 frame injection, one-click MANA Evil Access Point setups, HID keyboard (Teensy like attacks), as well as Bad USB MITM attacks.

Page 7: Kali linux

Popular Culture

The logo of Kali Linux appears on the background in the activist and cybersecurity related TV series Mr. Robot (2015).

Page 8: Kali linux

Security-focused operating system

As such, something can be secure without being "security-focused." For example, almost all of the operating systems mentioned here are faced with security bug fixes in their lifetime; however, they all strive to consistently approach all generic security flaws inherent in their design with new ideas in an attempt to create a secure computing environment. Security-focused does not mean security-evaluated operating system, which refers to operating systems that have achieved certification from an external security-auditing organization.

Page 9: Kali linux

Reference Page