SlideShare a Scribd company logo
Kali LinuxThe quieter you become the more you are
able to hear
What is Kali Linux
● Kali Linux is a Debian-derived operating system
designed for digital forensics & penetration testing.
● Kali contains several hundred tools for various for
security tasks such as Penetration Testing, Security
Research, Computer Forensics & Reverse
Engineering
● It is maintained & funded by Offensive Security Ltd
● Mati Aharoni is the core developer.
● It's a rewrite of Backtrack
History
● Knoppix , ancestor of Kali Linux was the 1st ever Live
Bootable Linux Operating System. Knoppix was then
forked into Whoppix & then re-forked into WHAX .
● WHAX was then re-branded as BackTrack ,
the predecessor of Kali Linux.
BackTrack had a long reign of almost 7 Years as the
pentesters & hackers choice.
● BackTrack is dedicated to hacking.
● As of 2011 it was used by more than 4 million amateur &
professional security researchers.
Backtrack Issues
The main issue with BackTrack was dependencies.
Too many pentesting tools were embedded within
BackTrack they all struggled to coexist within the
dependencies
However, on 13th March 2013 it was replaced by
Kali Linux.
Solution to BackTrack
● The solution was a complete top-to-bottom rebuild of
BackTrack Linux
● Kali Linux has 600 tools which automatically work within
the Kali ecosphere. Kali also has been created with clean
File System Hierarchy Standard & offers vast plug &
play wireless support.
● The main attraction was the ARM support provided by
Kali Linux. You can also create your own .iso file with
Kali through the Debian build feature.
Knoppix
Whoppix
WHAX
Backtrack
Kali
Evolution of
Kali Linux
Features
● More than 600 penetration testing tools included.
● Free and Open Source
● Has Monolithic type Kernel
(A Monolithic kernel is an OS architecture where the entire OS is working in kernel space.
Monolithic kernels are able to dynamically load executable modules at runtime)
● Available in 32 & 64-bit
● Filesystem Hierarchy Standard
● Wide-ranging wireless device support
● Developed in a secure environment
● GPG signed packages & repositories
● Multi-language support
● Completely Customizable
● ARM devices support
Forensic Mode
When booted into the forensic boot mode, there are
a few very important changes to the regular
operation of the system:
1. First, the internal hard disk is never touched
2. Other, equally important, change is that auto-
mounting of removable media is disabled.
Its newest version
Kali Linux 2017.1 was released
on 25 April 2017
What is Penetration Testing?
“ The process of evaluating systems applications &
protocols with the intent of identifying vulnerabilities
usually from the perspective of an unprivileged or
anonymous user to
determine potential real world impacts ”
Or in other words
...we try to break into stuff before the bad guys do...
Booting Process
● BIOS loads & scans for devices such as Hard Disk, CD-ROM, RAM, etc.
● BIOS searches for MBR (Master Boot Record) & hands over the
responsibility to MBR.
● MBR contains the information of loader of most operating system
e.g UNIX, Linux & WINDOWS
● Boot loader loads itself into RAM
● The default stage 2 boot loader is a GRUB(Grand Unified Boot
Loader) or LILO (Linux Loader)
● Once GRUB is loaded into RAM, then it’s search for the location of
Kernel.
● Kernel starts the core system like RAM, processor & mass storage
& loads all the various daemons and mounts all the partitions
Requirements
● Kali Linux requires a minimum of 20GB hard
disk space for installation.
● A minimum of 1GB RAM
● A bootable CD-DVD drive or a USB stick.
Supported Platforms
● Kali Linux is distributed in 16 & 32 Bits
● Developers of Kali Linux aim to make Kali Linux
available for ARM devices
● With the arrival of Kali NetHunter, it is now
available on smartphones such as the Nexus
Models, OnePlus Phones & some Samsung
models.
● Chromebooks
Flexibility
● Kali Linux can run natively when installed on a
computer’s hard disk or can be booted from CD or
USB or on a virtual machine.
● Available for ARM devices like Chromebooks ,
Samsung Galaxy Note 10.1, Raspberry Pi, CuBox & a
lot more.
● KALI LINUX can also be installed within a root
environment on an android device
Penetration-Testing Programs
Kali Linux is preinstalled with numerous penetration
testing programs :
● nmap - a port scanner
● Wireshark - a packet analyzer
● John The Ripper - a password cracker
● Aircrack-ng - a software suite for penetration
testing wireless LANs
● iKat- a hacking tool
UBUNTU
● Linux Platform
● Ubuntu is a general desktop
and server distribution
● Designed to satisfy general
Desktop & Server requirements
& also targeted in some smart
TVs
KALI
● Debian Platform
● Kali Linux is a specialized
distribution
● Primarily designed for
purposes like Penetration
Server Testing and Digital
requirements and also
Forensics
Information Security Certifications
Offensive Security Ltd. provides courses &
certifications related to Kali Linux. These
certifications are :
● OSCP - Offensive Security Certified Professional
● OSWP - Offensive Security Wireless Professional
● OSCE - Offensive Security Certified Expert
● OSEE - Offensive Security Exploitation Expert
● OSWE - Offensive Security Web Expert
Kali Linux
Mati Aharoni is the founder and core developer of
Kali Linux project , as well the CEO of Offensive Security.
“It is critical to take the view of the
attacker to see if your defenses are working "
This was the main idea behind the development of
KALI LINUX

More Related Content

PPTX
Kali linux.ppt
PPTX
Kali Linux
PPTX
Linux fundamentals
PPTX
Kali linux
PPTX
kali linux Presentaion
PDF
Linux Tutorial For Beginners | Linux Administration Tutorial | Linux Commands...
PPTX
kali linux.pptx
Kali linux.ppt
Kali Linux
Linux fundamentals
Kali linux
kali linux Presentaion
Linux Tutorial For Beginners | Linux Administration Tutorial | Linux Commands...
kali linux.pptx

What's hot (20)

PPTX
kali linux.pptx
PPTX
Linux security
PPTX
Kali presentation
PPTX
what is LINUX ? presentation.
PPTX
A History of Linux
PPT
Linux
PPT
Linux history & features
PPTX
Linux ppt
PDF
Presentation on linux
PPTX
Introduction to linux
PPTX
Linux operating system - Overview
PDF
PPT
Linux command ppt
PPT
Ch02 System Threats and Risks
PDF
Nessus Software
PPTX
Basics of Network Security
PPT
Linux - Introductions to Linux Operating System
PPTX
Introduction To Exploitation & Metasploit
PPT
Intrusion Detection Systems and Intrusion Prevention Systems
PPTX
Linux kernel
kali linux.pptx
Linux security
Kali presentation
what is LINUX ? presentation.
A History of Linux
Linux
Linux history & features
Linux ppt
Presentation on linux
Introduction to linux
Linux operating system - Overview
Linux command ppt
Ch02 System Threats and Risks
Nessus Software
Basics of Network Security
Linux - Introductions to Linux Operating System
Introduction To Exploitation & Metasploit
Intrusion Detection Systems and Intrusion Prevention Systems
Linux kernel
Ad

Similar to Kali Linux (20)

PPTX
Kalilinux
PDF
Operating system
PPTX
kali linux
PPTX
Kali Linux
PPTX
Kali Linux
DOCX
Operating project
PPTX
Shamsa altayer 10bg kali linux
DOCX
kali linix
PPTX
Kali linux
PPTX
kalilinux.pptxfgfgfdgfdgfdgfdgfdfgfgfgfgfg
PPTX
technical-presentation-kali-linux.pptx
PPTX
technical-presentation-kali-linux.pptx hakkında
PPTX
Kali linux
PPTX
Kali Linux - Falconer - ISS 2014
PPTX
Kali linux
PPTX
Kali Linux - CleveSec 2015
PPTX
Kali linux
PPTX
Kali linux
PDF
Unleash the Power: How to Install Kali Linux With a Twist
DOCX
What is Kali Linux_ A Comprehensive Guide for Beginners.docx
Kalilinux
Operating system
kali linux
Kali Linux
Kali Linux
Operating project
Shamsa altayer 10bg kali linux
kali linix
Kali linux
kalilinux.pptxfgfgfdgfdgfdgfdgfdfgfgfgfgfg
technical-presentation-kali-linux.pptx
technical-presentation-kali-linux.pptx hakkında
Kali linux
Kali Linux - Falconer - ISS 2014
Kali linux
Kali Linux - CleveSec 2015
Kali linux
Kali linux
Unleash the Power: How to Install Kali Linux With a Twist
What is Kali Linux_ A Comprehensive Guide for Beginners.docx
Ad

Recently uploaded (20)

DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
MYSQL Presentation for SQL database connectivity
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Big Data Technologies - Introduction.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPT
Teaching material agriculture food technology
PDF
Modernizing your data center with Dell and AMD
PDF
Electronic commerce courselecture one. Pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
The AUB Centre for AI in Media Proposal.docx
Building Integrated photovoltaic BIPV_UPV.pdf
Approach and Philosophy of On baking technology
Dropbox Q2 2025 Financial Results & Investor Presentation
NewMind AI Weekly Chronicles - August'25 Week I
MYSQL Presentation for SQL database connectivity
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Mobile App Security Testing_ A Comprehensive Guide.pdf
A Presentation on Artificial Intelligence
Per capita expenditure prediction using model stacking based on satellite ima...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Big Data Technologies - Introduction.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Teaching material agriculture food technology
Modernizing your data center with Dell and AMD
Electronic commerce courselecture one. Pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Machine learning based COVID-19 study performance prediction
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...

Kali Linux

  • 1. Kali LinuxThe quieter you become the more you are able to hear
  • 2. What is Kali Linux ● Kali Linux is a Debian-derived operating system designed for digital forensics & penetration testing. ● Kali contains several hundred tools for various for security tasks such as Penetration Testing, Security Research, Computer Forensics & Reverse Engineering ● It is maintained & funded by Offensive Security Ltd ● Mati Aharoni is the core developer. ● It's a rewrite of Backtrack
  • 3. History ● Knoppix , ancestor of Kali Linux was the 1st ever Live Bootable Linux Operating System. Knoppix was then forked into Whoppix & then re-forked into WHAX . ● WHAX was then re-branded as BackTrack , the predecessor of Kali Linux. BackTrack had a long reign of almost 7 Years as the pentesters & hackers choice. ● BackTrack is dedicated to hacking. ● As of 2011 it was used by more than 4 million amateur & professional security researchers.
  • 4. Backtrack Issues The main issue with BackTrack was dependencies. Too many pentesting tools were embedded within BackTrack they all struggled to coexist within the dependencies However, on 13th March 2013 it was replaced by Kali Linux.
  • 5. Solution to BackTrack ● The solution was a complete top-to-bottom rebuild of BackTrack Linux ● Kali Linux has 600 tools which automatically work within the Kali ecosphere. Kali also has been created with clean File System Hierarchy Standard & offers vast plug & play wireless support. ● The main attraction was the ARM support provided by Kali Linux. You can also create your own .iso file with Kali through the Debian build feature.
  • 7. Features ● More than 600 penetration testing tools included. ● Free and Open Source ● Has Monolithic type Kernel (A Monolithic kernel is an OS architecture where the entire OS is working in kernel space. Monolithic kernels are able to dynamically load executable modules at runtime) ● Available in 32 & 64-bit ● Filesystem Hierarchy Standard ● Wide-ranging wireless device support ● Developed in a secure environment ● GPG signed packages & repositories ● Multi-language support ● Completely Customizable ● ARM devices support
  • 8. Forensic Mode When booted into the forensic boot mode, there are a few very important changes to the regular operation of the system: 1. First, the internal hard disk is never touched 2. Other, equally important, change is that auto- mounting of removable media is disabled.
  • 9. Its newest version Kali Linux 2017.1 was released on 25 April 2017
  • 10. What is Penetration Testing? “ The process of evaluating systems applications & protocols with the intent of identifying vulnerabilities usually from the perspective of an unprivileged or anonymous user to determine potential real world impacts ” Or in other words ...we try to break into stuff before the bad guys do...
  • 11. Booting Process ● BIOS loads & scans for devices such as Hard Disk, CD-ROM, RAM, etc. ● BIOS searches for MBR (Master Boot Record) & hands over the responsibility to MBR. ● MBR contains the information of loader of most operating system e.g UNIX, Linux & WINDOWS ● Boot loader loads itself into RAM ● The default stage 2 boot loader is a GRUB(Grand Unified Boot Loader) or LILO (Linux Loader) ● Once GRUB is loaded into RAM, then it’s search for the location of Kernel. ● Kernel starts the core system like RAM, processor & mass storage & loads all the various daemons and mounts all the partitions
  • 12. Requirements ● Kali Linux requires a minimum of 20GB hard disk space for installation. ● A minimum of 1GB RAM ● A bootable CD-DVD drive or a USB stick.
  • 13. Supported Platforms ● Kali Linux is distributed in 16 & 32 Bits ● Developers of Kali Linux aim to make Kali Linux available for ARM devices ● With the arrival of Kali NetHunter, it is now available on smartphones such as the Nexus Models, OnePlus Phones & some Samsung models. ● Chromebooks
  • 14. Flexibility ● Kali Linux can run natively when installed on a computer’s hard disk or can be booted from CD or USB or on a virtual machine. ● Available for ARM devices like Chromebooks , Samsung Galaxy Note 10.1, Raspberry Pi, CuBox & a lot more. ● KALI LINUX can also be installed within a root environment on an android device
  • 15. Penetration-Testing Programs Kali Linux is preinstalled with numerous penetration testing programs : ● nmap - a port scanner ● Wireshark - a packet analyzer ● John The Ripper - a password cracker ● Aircrack-ng - a software suite for penetration testing wireless LANs ● iKat- a hacking tool
  • 16. UBUNTU ● Linux Platform ● Ubuntu is a general desktop and server distribution ● Designed to satisfy general Desktop & Server requirements & also targeted in some smart TVs KALI ● Debian Platform ● Kali Linux is a specialized distribution ● Primarily designed for purposes like Penetration Server Testing and Digital requirements and also Forensics
  • 17. Information Security Certifications Offensive Security Ltd. provides courses & certifications related to Kali Linux. These certifications are : ● OSCP - Offensive Security Certified Professional ● OSWP - Offensive Security Wireless Professional ● OSCE - Offensive Security Certified Expert ● OSEE - Offensive Security Exploitation Expert ● OSWE - Offensive Security Web Expert
  • 19. Mati Aharoni is the founder and core developer of Kali Linux project , as well the CEO of Offensive Security. “It is critical to take the view of the attacker to see if your defenses are working " This was the main idea behind the development of KALI LINUX