Introduction To Kali Linux.steemCreated with Sketch.

in #hacking7 years ago

This is the information you should know before using Kali Linux. In normal language, the startup guide of Kali Linux.


Kali Linux is an advanced Penetration Testing and Security Auditing Linux distribution.
In a general way, it’s an operating system used for hacking. Anything used for bad always leads to bad. If you gain access in other’s computer without prior notice and written permissions, it’s an illegal activity which might even lead you to prison. So use it only with written permissions on other’s property or on your property. The main thing is that you do not hurt anyone. If you agree, let’s Get Further.

Kali is a complete re-build of BackTrack Linux, adhering completely to Debian development standards. All-new infrastructure has been put in place, all tools were reviewed and packaged, and we use Git for our VCS.

More than 300 penetration testing tools: After reviewing every tool that was included in BackTrack, we eliminated a great number of tools that either did not work or had other tools available that provided similar functionality. Free and always will be: Kali Linux, like its predecessor, is completely free and always will be. You will never, ever have to pay for Kali Linux. Open source Git tree: We are huge proponents of open source software and our development tree is available for all to see and all sources are available for those who wish to tweak and rebuild packages. FHS compliant: Kali has been developed to adhere to the Filesystem Hierarchy Standard, allowing all Linux users to easily locate binaries, support files, libraries, etc. Vast wireless device support: We have built Kali Linux to support as many wireless devices as we possibly can, allowing it to run properly on a wide variety of hardware and making it compatible with numerous USB and other wireless devices. Custom kernel patched for injection: As penetration testers, the development team often needs to do wireless assessments so our kernel has the latest injection patches included. Secure development environment: The Kali Linux team is made up of a small group of trusted individuals who can only commit packages and interact with the repositories while using multiple secure protocols. GPG signed packages and repos: All Kali packages are signed by each individual developer when they are built and committed and the repositories subsequently sign the packages as well. Multi-language: Although pentesting tools tend to be written in English, we have ensured that Kali has true multilingual support, allowing more users to operate in their native language and locate the tools they need for the job. Completely customizable: We completely understand that not everyone will agree with our design decisions so we have made it as easy as possible for our more adventurous users to customize Kali Linux to their liking, all the way down to the kernel. ARMEL and ARMHF support: Since ARM-based systems are becoming more and more prevalent and inexpensive, we knew that Kali’s ARM support would need to be as robust as we could manage, resulting in working installations for both ARMEL and ARMHF systems. Kali Linux has ARM repositories integrated with the mainline distribution so tools for ARM will be updated in conjunction with the rest of the distribution.
Kali is currently available for the following ARM devices:
rk3306 mk/ss808
Raspberry Pi
ODROID U2/X2
Samsung Chromebook
EfikaMX Beaglebone Black
CuBox
Galaxy Note 10.1

Differences between Kali Linux and Debian
Kali Linux is geared towards professional penetration testing and security auditing. As such, several core changes have been implemented in Kali Linux which reflect these needs: 1. Single user, root access by design: Due to the nature of security audits, Kali linux is designed to be used in a “single, root user” scenario. 2. Network services disabled by default: Kali Linux contains sysvinit hooks which disable network services by default. These hooks allow us to install various services on Kali Linux, while ensuring that our distribution remains secure by default, no matter what packages are installed. Additional services such as Bluetooth are also blacklisted by default. 3. Custom Linux kernel: Kali Linux uses an upstream kernel, patched for wireless injection.

If you are looking for a Linux distribution to learn the basics of Linux and need a good starting point, Kali Linux is not the ideal distribution for you. You may want to begin with Ubuntu or Debian instead.

During installation, Kali Linux allows users to configure a password for the root user. However, should you decide to boot the live image instead, the i386, amd64, VMware and ARM images are configured with the default root password – “toor“, without the quotes.

To download Kali Linux ISO, go to: - http://www.kali.org/downloads/
To download VMware, go to:- http://images.offensive-security.com/

Any Questions? Ask Me. I would be happy to hear.

Sort:  

Salute! I saw that you joined recently so welcome to steemit. Have an upvote and I'm waiting for many more posts in the future!
I am struggeling, like you, to get those big upvotes on my posts so maybe you want to try @MinnowPowerUp where you can earn up to 30% more steem power than just directly powering up! It's a subscription based daily upvote bot that draws its power from a delegation pool. I made this post to explain the system in more depth and show how I earn over $1 a day in upvotes.

Coin Marketplace

STEEM 0.15
TRX 0.17
JST 0.028
BTC 68748.32
ETH 2464.48
USDT 1.00
SBD 2.36