SlideShare a Scribd company logo
WELCOME
O.S PROJECT BY OUR GROUP
GROUP MEMBERS {B/B1}
!NAME !ENROLLMENT
*AKSHAT MODI : 216230316135
*KARTIKEY BANJARA : 216230316129
*MEET DIXIT: 216230316136
*AVI PRAJAPATI : 216230316171
PROJECT TITEL {KALI LINUX}
•Kali Linux (formerly known as BackTrack Linux) is an open-
source, Debian-based Linux distribution aimed at
advanced Penetration Testing and Security Auditing.
KALI LINUX HISTORY
• Kali Linux is based on years of knowledge and experience of
building a pentestion testing Operating Systems, which has
spanned over multiple previous projects. During all these
project’s life-time, there has been only a few different developers,
as the team has always been small. As a result, Kali has been
years in the making and has come a long way.
• The first project was called Whoppix, which stood for White Hat
Knoppix. As can be inferred from the name, it was based on
Knoppix for the underlining OS. Whoppix had releases ranging
from v2.0 to v2.7.
• This made way for the next project, WHAX (or the long
hand, WhiteHat Slax). The name change was because the base OS
changed from Knoppix to Slax. WHAX started at v3, as a nod
towards it carrying on from Whoppix.
• There was a similar OS being produced at the same time, Auditor
Security Collection (often getting shorted to just Auditor), once
again using Knoppix, and efforts were combined (with WHAX) to
produce BackTrack. BackTrack was based on Slackware from v1
to v3, but switched to Ubuntu later on with v4 to v5.
KALI NETHUNTER HISTORY
• Kali NetHunter is a custom OS for Android devices. This takes Kali
Linux desktop and makes it mobile.
• Kali NetHunter is made up of three parts:
• (ROM)
• [App (and AppStore)]
• (Kali Chroot)
• Kali Net Hunter was first released in September 2014 with v1.0,
supporting just Nexus devices (5,7 and 10). There was a minor
release of Kali NetHunter v1.1 in January 2015, and at the same
time device support started to appear, such as OnePlus One and
Nexus 4.
• Kali Net Hunter v3 was the next major release in January 2016,
which was a complete Net Hunter app rewrite, allowing for more
control and actions to be performed from it, build scripts and
Android 5 and 6 support. Nexus 6 device also became supported.
• Kali Net Hunter then joined the rolling release with 2019.2
release in May 2019, where 13 devices where supported, with a
mixture of Android 4 to 9. From this point, Kali Net Hunter
matched the release points of Kali Linux, with each of them
adding more devices support, image and overall features.
WHAT IS KALI LINUX?
• Kali Linux (formerly known as BackTrack Linux) is an open-source, Debian-based
Linux distribution aimed at advanced Penetration Testing and Security
Auditing. It does this by providing common tools, configurations, and
automations which allows the user to focus on the task that needs to be
completed, not the surrounding activity.
• Kali Linux contains industry specific modifications as well as several hundred
tools targeted towards various Information Security tasks, such as Penetration
Testing, Security Research, Computer Forensics, Reverse Engineering,
Vulnerability Management and Red Team Testing.
• Kali Linux is a multi-platform solution, accessible and freely available to
information security professionals and hobbyists.
KALI LINUX FEATURES
• More than 600 penetration testing tools included: After reviewing every tool that was included
in BackTrack, we eliminated a great number of tools that either simply did not work or which
duplicated other tools that provided the same or similar functionality. Details on what’s included
are on the Kali Tools site.
• Free (as in beer) and always will be: Kali Linux, like BackTrack, is completely free of charge and
always will be. You will never, ever have to pay for Kali Linux.
• Open source Git tree: We are committed to the open source development model and
our development tree is available for all to see. All of the source code which goes into Kali Linux is
available for anyone who wants to tweak or rebuild packages to suit their specific needs.
• FHS compliant: Kali adheres to the Filesystem Hierarchy Standard, allowing Linux users to easily
locate binaries, support files, libraries, etc.
• Wide-ranging wireless device support: A regular sticking point with Linux distributions has been
support for wireless interfaces. We have built Kali Linux to support as many wireless devices as we
possibly can, allowing it to run properly on a wide variety of hardware and making it compatible
with numerous USB and other wireless devices.
• Custom kernel, patched for injection: As penetration testers, the
development team often needs to do wireless assessments, so our kernel has
the latest injection patches included.
• Developed in a secure environment: The Kali Linux team is made up of a
small group of individuals who are the only ones trusted to commit packages
and interact with the repositories, all of which is done using multiple secure
protocols.
• GPG signed packages and repositories: Every package in Kali Linux is signed by each
individual developer who built and committed it, and the repositories subsequently sign
the packages as well.
• Multi-language support: Although penetration tools tend to be written in English, we
have ensured that Kali includes true multilingual support, allowing more users to
operate in their native language and locate the tools they need for the job.
• Completely customizable: We thoroughly understand that not everyone will agree with
our design decisions, so we have made it as easy as possible for our more adventurous
users to customize Kali Linux to their liking, all the way down to the kernel.
•
• ARMEL and ARMHF support: Since ARM-based single-board
systems like the Raspberry Pi and {BeagleBone} Black, among
others, are becoming more and more prevalent and inexpensive,
we knew that Kali’s ARM support would need to be as robust as
we could manage, with fully working installations for both ARMEL
and ARMHF systems. Kali Linux is available on a wide range of
ARM devices and has ARM repositories integrated with the
mainline distribution so tools for ARM are updated in conjunction
with the rest of the distribution.
• For more features of Kali Linux, please see the following page: Kali
Linux Overview.
• Kali Linux is specifically tailored to the needs of penetration
testing professionals, and therefore all documentation on this site
assumes prior knowledge of, and familiarity with, the Linux
operating system in general.
WHAT’S DIFFERENT ABOUT KALI LINUX?
• Kali Linux is specifically geared to meet the requirements of professional penetration
testing and security auditing. To achieve this, several core changes have been
implemented in Kali Linux which reflect these needs:
1.Network services disabled by default: Kali Linux contains systemd hooks that disable network
services by default. These hooks allow us to install various services on Kali Linux, while ensuring
that our distribution remains secure by default, no matter what packages are installed. Additional
services such as Bluetooth are also blocklisted by default.
2.Custom Linux kernel: Kali Linux uses an upstream kernel, patched for wireless
injection.
3.A minimal and trusted set of repositories: given the aims and goals of Kali Linux, maintaining the
integrity of the system as a whole is absolutely key. With that goal in mind, the set of upstream
software sources which Kali uses is kept to an absolute minimum. Many new Kali users are tempted
to add additional repositories to their sources list, but doing so runs a very serious risk of breaking
your Kali Linux installation.
Thank you

More Related Content

PPTX
Kali Linux
PPTX
Kalilinux
DOCX
Operating project
PPTX
Kali linux
PPTX
kali linux Presentaion
PPTX
technical-presentation-kali-linux.pptx hakkında
PPTX
technical-presentation-kali-linux.pptx
PPTX
Shamsa altayer 10bg kali linux
Kali Linux
Kalilinux
Operating project
Kali linux
kali linux Presentaion
technical-presentation-kali-linux.pptx hakkında
technical-presentation-kali-linux.pptx
Shamsa altayer 10bg kali linux

Similar to Operating system (20)

PPTX
Kali Linux
PPTX
Kali linux
PPTX
Kali linux
PPTX
Kali Linux
PPTX
Kali Linux
PPTX
kali linux
PPTX
Kali Linux-Operating System Presentation.pptx
PPTX
Kali linux
DOCX
kali linix
PPTX
Kali presentation
PPTX
Kali Linux - CleveSec 2015
PPTX
kalilinux.pptxfgfgfdgfdgfdgfdgfdfgfgfgfgfg
PPTX
Kali linux
PDF
penetration test using Kali linux seminar report
PPTX
Kali linux.ppt
PPTX
kali linux.pptx
PPTX
Kali Linux - Falconer - ISS 2014
DOCX
What is Kali Linux_ A Comprehensive Guide to Ethical Hacking.docx
PPTX
linux.pptx
PDF
(03 2013) guide to kali linux
Kali Linux
Kali linux
Kali linux
Kali Linux
Kali Linux
kali linux
Kali Linux-Operating System Presentation.pptx
Kali linux
kali linix
Kali presentation
Kali Linux - CleveSec 2015
kalilinux.pptxfgfgfdgfdgfdgfdgfdfgfgfgfgfg
Kali linux
penetration test using Kali linux seminar report
Kali linux.ppt
kali linux.pptx
Kali Linux - Falconer - ISS 2014
What is Kali Linux_ A Comprehensive Guide to Ethical Hacking.docx
linux.pptx
(03 2013) guide to kali linux

Recently uploaded (20)

PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Spectroscopy.pptx food analysis technology
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Machine learning based COVID-19 study performance prediction
PPT
Teaching material agriculture food technology
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Electronic commerce courselecture one. Pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Approach and Philosophy of On baking technology
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
Per capita expenditure prediction using model stacking based on satellite ima...
Spectroscopy.pptx food analysis technology
Programs and apps: productivity, graphics, security and other tools
Empathic Computing: Creating Shared Understanding
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Machine learning based COVID-19 study performance prediction
Teaching material agriculture food technology
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
The Rise and Fall of 3GPP – Time for a Sabbatical?
Electronic commerce courselecture one. Pdf
20250228 LYD VKU AI Blended-Learning.pptx
Unlocking AI with Model Context Protocol (MCP)
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Approach and Philosophy of On baking technology
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
MIND Revenue Release Quarter 2 2025 Press Release

Operating system

  • 2. GROUP MEMBERS {B/B1} !NAME !ENROLLMENT *AKSHAT MODI : 216230316135 *KARTIKEY BANJARA : 216230316129 *MEET DIXIT: 216230316136 *AVI PRAJAPATI : 216230316171
  • 3. PROJECT TITEL {KALI LINUX} •Kali Linux (formerly known as BackTrack Linux) is an open- source, Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing.
  • 4. KALI LINUX HISTORY • Kali Linux is based on years of knowledge and experience of building a pentestion testing Operating Systems, which has spanned over multiple previous projects. During all these project’s life-time, there has been only a few different developers, as the team has always been small. As a result, Kali has been years in the making and has come a long way. • The first project was called Whoppix, which stood for White Hat Knoppix. As can be inferred from the name, it was based on Knoppix for the underlining OS. Whoppix had releases ranging from v2.0 to v2.7.
  • 5. • This made way for the next project, WHAX (or the long hand, WhiteHat Slax). The name change was because the base OS changed from Knoppix to Slax. WHAX started at v3, as a nod towards it carrying on from Whoppix. • There was a similar OS being produced at the same time, Auditor Security Collection (often getting shorted to just Auditor), once again using Knoppix, and efforts were combined (with WHAX) to produce BackTrack. BackTrack was based on Slackware from v1 to v3, but switched to Ubuntu later on with v4 to v5.
  • 6. KALI NETHUNTER HISTORY • Kali NetHunter is a custom OS for Android devices. This takes Kali Linux desktop and makes it mobile. • Kali NetHunter is made up of three parts: • (ROM) • [App (and AppStore)] • (Kali Chroot)
  • 7. • Kali Net Hunter was first released in September 2014 with v1.0, supporting just Nexus devices (5,7 and 10). There was a minor release of Kali NetHunter v1.1 in January 2015, and at the same time device support started to appear, such as OnePlus One and Nexus 4. • Kali Net Hunter v3 was the next major release in January 2016, which was a complete Net Hunter app rewrite, allowing for more control and actions to be performed from it, build scripts and Android 5 and 6 support. Nexus 6 device also became supported. • Kali Net Hunter then joined the rolling release with 2019.2 release in May 2019, where 13 devices where supported, with a mixture of Android 4 to 9. From this point, Kali Net Hunter matched the release points of Kali Linux, with each of them adding more devices support, image and overall features.
  • 8. WHAT IS KALI LINUX? • Kali Linux (formerly known as BackTrack Linux) is an open-source, Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. It does this by providing common tools, configurations, and automations which allows the user to focus on the task that needs to be completed, not the surrounding activity. • Kali Linux contains industry specific modifications as well as several hundred tools targeted towards various Information Security tasks, such as Penetration Testing, Security Research, Computer Forensics, Reverse Engineering, Vulnerability Management and Red Team Testing. • Kali Linux is a multi-platform solution, accessible and freely available to information security professionals and hobbyists.
  • 9. KALI LINUX FEATURES • More than 600 penetration testing tools included: After reviewing every tool that was included in BackTrack, we eliminated a great number of tools that either simply did not work or which duplicated other tools that provided the same or similar functionality. Details on what’s included are on the Kali Tools site. • Free (as in beer) and always will be: Kali Linux, like BackTrack, is completely free of charge and always will be. You will never, ever have to pay for Kali Linux. • Open source Git tree: We are committed to the open source development model and our development tree is available for all to see. All of the source code which goes into Kali Linux is available for anyone who wants to tweak or rebuild packages to suit their specific needs. • FHS compliant: Kali adheres to the Filesystem Hierarchy Standard, allowing Linux users to easily locate binaries, support files, libraries, etc. • Wide-ranging wireless device support: A regular sticking point with Linux distributions has been support for wireless interfaces. We have built Kali Linux to support as many wireless devices as we possibly can, allowing it to run properly on a wide variety of hardware and making it compatible with numerous USB and other wireless devices.
  • 10. • Custom kernel, patched for injection: As penetration testers, the development team often needs to do wireless assessments, so our kernel has the latest injection patches included. • Developed in a secure environment: The Kali Linux team is made up of a small group of individuals who are the only ones trusted to commit packages and interact with the repositories, all of which is done using multiple secure protocols. • GPG signed packages and repositories: Every package in Kali Linux is signed by each individual developer who built and committed it, and the repositories subsequently sign the packages as well. • Multi-language support: Although penetration tools tend to be written in English, we have ensured that Kali includes true multilingual support, allowing more users to operate in their native language and locate the tools they need for the job. • Completely customizable: We thoroughly understand that not everyone will agree with our design decisions, so we have made it as easy as possible for our more adventurous users to customize Kali Linux to their liking, all the way down to the kernel. •
  • 11. • ARMEL and ARMHF support: Since ARM-based single-board systems like the Raspberry Pi and {BeagleBone} Black, among others, are becoming more and more prevalent and inexpensive, we knew that Kali’s ARM support would need to be as robust as we could manage, with fully working installations for both ARMEL and ARMHF systems. Kali Linux is available on a wide range of ARM devices and has ARM repositories integrated with the mainline distribution so tools for ARM are updated in conjunction with the rest of the distribution. • For more features of Kali Linux, please see the following page: Kali Linux Overview. • Kali Linux is specifically tailored to the needs of penetration testing professionals, and therefore all documentation on this site assumes prior knowledge of, and familiarity with, the Linux operating system in general.
  • 12. WHAT’S DIFFERENT ABOUT KALI LINUX? • Kali Linux is specifically geared to meet the requirements of professional penetration testing and security auditing. To achieve this, several core changes have been implemented in Kali Linux which reflect these needs: 1.Network services disabled by default: Kali Linux contains systemd hooks that disable network services by default. These hooks allow us to install various services on Kali Linux, while ensuring that our distribution remains secure by default, no matter what packages are installed. Additional services such as Bluetooth are also blocklisted by default. 2.Custom Linux kernel: Kali Linux uses an upstream kernel, patched for wireless injection. 3.A minimal and trusted set of repositories: given the aims and goals of Kali Linux, maintaining the integrity of the system as a whole is absolutely key. With that goal in mind, the set of upstream software sources which Kali uses is kept to an absolute minimum. Many new Kali users are tempted to add additional repositories to their sources list, but doing so runs a very serious risk of breaking your Kali Linux installation.