About and weak spots in their networks. Kali






About Kali Linux

Heath Kyker

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

Hallmark University
















Linux is a powerful hacking tool that was made for penetration testing and has
many distinctive features that can assist those who wish to find
vulnerabilities and easy ways in to their networks. On top of penetration
testing, forensic analysis and security auditing tools are available to the
network administrators. The first release of Kali Linux was release on March
12, 2013. The first “Kali” Linux was actually called BackTrack, and has become
an extremely popular tool for many who wish to perform penetration testing on

are many flavors in Linux to choose from. For example, those in enterprise
situations might choose RedHat or the free version CentOS. End users who just
want Linux as their personal computer operating system might choose Debian, Ubuntu,
Mint, or Fedora. There are literally hundreds of distributions to choose from.
The Kali Linux operating system is based on the Debian distribution of Linux.
This basically means that the packages one was to install on Kali come from the
Debian repository. Although the Debian distribution, as well as Ubuntu, are
more for end users, Kali Linux should not really be used as a personal computer
operating system. It is more aimed toward its tools for penetration testing and
ethical hacking. The real difference lies within the “forked” packages that
Kali adds to the Debian packages.

main purpose that Kali was designed for is penetration testing. As mentioned
before, this gives network administrators and cyber security professionals
great tools to use to find backdoors, vulnerabilities and weak spots in their
networks. Kali can be used on laptops with wireless capabilities in order to
test the vulnerability of the wireless passwords and traffic. It can also be
installed on servers, so it can monitor network traffic. Here are some of the
features that Kali Linux has to offer. Information gathering – collect data
about your network and the devices on it, Vulnerability – find configurations
that are not secure, and identify potential areas of threat, Password attacks –
keep the authentication agents of your network safe, Reverse engineering – it
can identify certain malware threats, Sniffing and Spoofing – catch your own
data as it traverses across network lines and WIFI signals and make sure it is
encrypted and stays out of the hands of attackers, Reporting tools – report any
and all weaknesses you find, and Social engineering – make sure the people that
are using the network do not have the ability to unknowingly compromise the
integrity of the network. These are the most common features that Kali users take
advantage of.

other important thing to discuss is how Kali Linux is a “live system”. This
basically means that in addition to being a full and dedicated install onto a
system, Kali can also be used as a bootable live system. Sometimes, penetration
testers might need a reason to use a machine on the network that is under review.
If they wish to use the tools of Kali to perform their tests, they can use a
bootable USB thumb drive or a bootable CD/DVD. By booting from the bootable
media on the computer, the penetration tester can have the tools at their
disposal, but also not leave any data on the computer. Therefore, they can do
their tests and whatever other work they need to do, unplug or eject their
bootable device or media, and be on their way. If the tester would in fact like
to save any changes to the system they have booted on, they would need to configure
their bootable media with “persistence.” This would allow them to perform any
configurations necessary to help aid in the safety of the system and keep those
changes even after the bootable drive has been removed.

with the “live” boot feature of Kali, forensics mode is also one that many
users find helpful. Changing data on a system while attempting to perform any
forensics would not be good, therefore, forensics mode disables features that
would allow the altering of data to the system, in particular the auto-mounting
of hard drives or any other disk that is detected.

Linux follows the Debian Linux policies, but some might be different. For example,
Kali Linux, be default, has root as the single user on the computer. Contrary
to most Linux distributions, who push the use of root only for changes to the
configuration or utilities of the system, Kali just basically gives you
administrative, or root, privileges from the very beginning. Many of the tools
that are installed from the ISO require root privileges to run, therefore, just
allowing the user root privileges from the start makes sense. And it would save
a lot of headache for the user if they get tired of typing their root password
over and over. Also, networking services such as network interfaces and WIFI
are disabled by default. In order to use these devices to gain network or
Internet access, the user must enable them. This gives a safer way to perform
penetration testing.

Linux is truly one of the best Linux operating systems, however, not for
everyone. It takes a special need and one must have very good reasons to use
Kali. If one were to use Kali as a personal computer, they might run into some
headaches due to the nature of Kali, but if one needed the hacking tools and programs,
Kali is the way to go. 


I'm Victor!

Would you like to get a custom essay? How about receiving a customized one?

Check it out