Ethical Hacking Free Course: Episode 08 ; kali Linux Overview. Why is this an all-in-one solution for hackers?
Ethical Hacking Free Course: Episode 08 ; kali Linux Overview. Why is this an all-in-one solution for hackers?
Those who are fairly involved with the term hacking know that hacking requires many types of tools. Now, there are certain types of tools for each task, some tools can work single and some tools can work multi. Now finding and installing each tool one by one or finding out the name of the tool first is a lot of time consuming work, and to be honest it is also a lot of hard work for those who are just starting to learn hacking. This is where the need for Kali Linux comes in, which can be called the mother of all hacking / security toolkits.
Ink nilaksa (Kali Linux) is a Linux distribution, and the main focus is security. Once you have this jetpack installed on your system, you will get everything built-in. It has 300+ hacking tools pre-installed and you can say that its user interface has been made ultra suitable for hackers. Like the different Linux distros, it has a live DVD / USB version, which means you can use it without having to install it on your computer. And the live use feature is ideal for hackers, because even after extracting a lot of information from a computer, there is no use trace, the hacker can safely move away at the end of the work.
However, this article gives only a basic overview of Kali Linux, and will be introduced in more detail with these Kali-Linux tools in later articles. And if you want to install ink on your system, you can check out our Linux installation tutorial.
What is Kali Linux and its history
They then changed the name from Back Track to Kali Linux and renamed their company Offensive Security . Kali Linux was first released in 2013 and since then many versions have been released. Their latest version is kali Linux 2018.1 It was released on 6th February, 2018. Click on this link to find out which version of them was released in which year . Currently it can only be installed on a computer, so you can also install it on your mobile. The biggest advantage of this is that even if you use it on your mobile, you will get all the features of Kali Linux. They have released Kali Linux as Kali Linux NetHunter for mobile .
The main features of Kali Linux
- It's completely free, you don't have to use a license or use a crack for it.
- It allows you to use it live. In other words, if you want, you can run it live on any computer with ink Linux on your pen drive without any installation.
- You can also use it on your mobile.
- You can also use it on devices like ARM hardware i.e. Raspberry Pi 2.
- The biggest advantage of this is that if you have Kali Linux installed, you will get 300+ tools pre-installed.
- You don't have to buy any tools, you don't have to sit for any tools. You will get all the tools in github.
- You will find so many penetration testing tools that I doubt if you will end up testing one by one every day. So I don't know the number of tools.
Some popular ink Linux tools.
2. Metasploit Pene tration Testing Software : This is the most popular penetration testing tool in Kali Linux. Although it is basically a hacking framework. It is made by a company called Rappid7. In between you will find many tools with which you can do penetration testing for free. For example, here you can make payload for Android, you can attack the server, etc. If you want to be a penetration tester or ethical hacker then you must have detailed knowledge about this tool.
3. Aircrack-ng: Aircrack-ng is a wireless hacking tool for ink linux. Kali is one of the most popular wireless hacking tools in Linux. It allows you to crack WPA / WPA2 encryption and WEP KEY can be cracked from time to time. It also collects packets, deauthentication, fake access points,
4. THC Hydra: THC Hydra is a password cracker tool made by sectools. It is a popular tool of hackers because of its speed, it can read word list very fast. Added to this (POP3, IMAP, etc.), Databases, LDAP, SMB, VNC, and SSH. It also supports CVS, FTP, HTTP (S) -FORM-GET, HTTP (S) -FORM-POST, HTTP (S) -GET, HTTP (S) -HEAD, HTTP-Proxy, ICQ, IMAP, IRC, LDAP, MS-SQL, MySQL, NNTP, Oracle Listener, Oracle SID, PC-Anywhere, PC-NFS, POP3, PostgreSQL, RDP, Rexec, Rlogin, Rsh, SIP, SMB (NT), SMTP, SMTP Enum, SNMP v1 + v2 + v3, SOCKS5, SSH (v1 and v2), SSHKEY, Subversion, Teamspeak (TS2), Telnet, VMware-Auth, VNC and XMPP.















No comments