Hacking Articles Part 30

71 3 0
                                        

All about Kali

[Disclaimer: The content of this article is for educational purposes only. It was written to help readers test their skills on using computers and/or Kali Linux and share knowledge about Kali Linux to the users. The writer of this article/guide take no responsibility for actions resulting from the inappropriate usage of informations contained of this article/guide.]

This is the last part guys, we got here so far and thanks for those who always read and follow to this group, Hacking Articles was became a great part of ~Rovic (Civor) The_Linux_Addict (My former screen name) and this article/guide will now end for this day so before I end this article/guide let me introduced to all of you a brief history of Kali Linux, I have been introducing most of the tools that we can use in Kali Linux so now I will introduced to you my best buddy and the half of the content of Hacking articles, The Kali Linux. Let's get into it!

Kali Linux is an enterprise-ready security auditing Linux distribution based on Debian GNU/Linux. Kali is aimed at security professionals and IT administrators, enabling them to conduct advanced penetration testing, forensic analysis, and security auditing.

Kali Linux project began quietly in 2012, when the Offensive Security decided that they wanted to replace their venerable BackTrack Linux project, which was manually maintained, with soething that could become a genuine Debian derivative, completely with all of the required infrastructure and improved packaging techniques. This decision was made to build Kali Linux under the Debian Distribution because it is well known for its quality, stability, and wide selection of available software.

You can download Kali Linux at:

The first release of Kali was in March 2013, and it was based on Debian 7 "Wheezy", Debian's stable distribution at the time. In 2015, the Debian 8 "Jessie" was released and they decided to rebase the Kali Linux on top of it.

What is the Default Desktop Environment of Kali Linux?

The default desktop environment of the kali Linux was called GNOME, a desktop environment is a collection of graphical applications that share a common graphical toolkit and that are meant to be used together on user workstations. GNOME is one of the most popular desktop environments and is installed on the main ISO images provided by Kali Linux. For more info about GNOME, go to their official website:

What is the purpose and use cases of Kali Linux?

Kali Linux is built as a framework, because it includes many tools covering different use cases. (All the Hacking Articles from part 16 to 28)

For example, Kali Linux can be used on various types of computers: obviously on the laptops of penetration testers, but also on servers of system administrators wishing to monitor their network, on the workstations of forensic analysts, and more unexpectedly, on stealthy embedded devices, typically with ARM CPUs, that can be dropped in the range of a wireless network or plugged in the computer of target users. Many ARM devices are also perfect attack machines due to their small form factors and low power requirements. Kali Linux can also be deployed in the cloud to quickly build a farm of password-cracking machines and on mobile phones and tablets to allow for truly portable penetration testing.

But that is not all; penetration testers also need servers: to use collaboration software within a team of pen-testers, to set up a web server for use in phishing campaigns, to run vulnerability scanning tools, and other related activities.

These tasks and activities include:

• Information Gathering: Collecting data about the target network and its structure, identifying computers, their operating systems, and the services that they run. Identifying potentially sensitive parts of the information system. Extracting all sorts of listings from running directory services.

Hacking ArticlesWhere stories live. Discover now