Pages

Saturday, 19 December 2015

Introduction to Kali Linux

Kali Linux is a Debian-based Linux distribution, It was launched on 13th March 2013, It is a complete rebuild of BackTrack with eliminating various tools which were inefficient or duplicated tools providing the same or similar functionality.


Kali Linux aimed at advanced Penetration Testing and Security Auditing using various tools which are divided into different categories:
  • Information Gathering
  • Vulnerability Analysis
  • Web Applications Analysis
  • Database Assessment
  • Password Attacks
  • Wireless Attacks
  • Reverse Engineering
  • Exploitations Tools
  • Sniffing and Spoofing
  • Post Exploitation
  • Forensics
  • Reporting Tools

Information Gathering: One of the most important thing to do before attacking any target . To able to launch an attack one need to have the basic information before attacking the target . This category has various tools which are made available while installing Kali Linux.

Vulnerability Analysis: Vulnerability analysis is also know as vulnerability assessment, it is a process that defines, identifies and classifies the security holes in a computer, network or any infrastructure.

Web Application Analysis: Web Application analysis refers to identifying vulnerability in applications deployed over the web. It used to secure your application so that your data is not leaked . 

Database Assessment: Database assessment refers to the risk associated with each database asset by looking data sensitivity, combined with a view of what vulnerabilities impact the data. 

Password Attacks: Password attack is basically a password guessing , attackers can guess passwords locally or remotely using different types of attacks like: dictionary attack , password sniffing , password capturing, password crackers. 

Wireless Attacks: Wireless attack is one of the most common security issue when it comes to networks. It is because such attacks can really get a lot of information that is being sent across a network and use it to commit some crimes in other network, Few types are Jamming, Rogue access Point, packet sniffing and replay attacks.

Sniffing and Spoofing: Sniffing and Spoofing are the security threats which targets the lower layer of Networking Infrastructure supporting applications which are running over web. Sniffing is the use of a network interface to receive data not intended for the machine in which the interface resides . Spoofing attack is when a malicious party impersonates another device or user on a network in order to launch attacks against network hosts, steal data, spread malware or bypass access controls. 

 Kali Linux ISO Image : Download Here

No comments:

Post a Comment