WHAT IS KALI LINUX? HOW IS IT USEFUL IN ETHICAL HACKING?

WHAT IS KALI LINUX? HOW IS IT USEFUL IN ETHICAL HACKING?

WHAT IS KALI LINUX?
KALI LINUX is a Debian-based Linux distribution for Advance Penetration testing and Security Auditing
KALI LINUX is a successor of BackTrack Linux.
It is designed for digital forensics and penetration testing funded by Offensive Security Ltd.
Initial Release 13 March 2013.
Kali Linux has also provided its certification ie (KLCP).

HOW  KALI LINUX IS MORE USEFUL THAN OTHERS?
KALI LINUX has over 600 preinstalled tool which is used for hacking so we don’t need to install them that is one of the positive sides of KALI LINUX. Kali Linux is an OPEN SOURCE Project.
Some of the Popular Tools in KALI LINUX and WHAT they are?
1)NAMP
Network Mapper is a security scanner. It helps in building a complete map of the network.
NAMP has also it’s GUI version ie Zenmap.
we can discover HOSTS and SERVICES on a computer network.NAMP sends specially crafted packets to the target computer and then analyze the responses.
NMAP 7.70 version is available now.
NMAP was first created for Linux systems but now it used in all major platform like Windows, Solaris, HP-UX including MacOS.

  • FEATURES
    1) OS detection: It identifies the os and hardware characteristics of the system.
    2) PORT Scanning: Finds the open, close and filtered ports.
    3) HOST Discovery: Identify hosts on a network that responds to TCP and ICMP request on a particular open port.
    4) SCRIPTABLE: Nmap also uses (NSE)Nmap Scripting Engine.
    5) NMAP has also its GUI.
  • USES
    1)Network Mapping.
    2)Identify Open Ports.
    3)Auditing the security of a device.
    4)Find and exploit vulnerabilities.

2)ARMITAGE
It is a free and Open Source. It is a Metasploit Project contributing to Red Team collaboration allowing for: Shared sessions, data.
Its front-end is GUI helping security professionals better understand hacking and to help them realize the power of Metasploit.
Originally made for CYBER DEFENSE EXERCISES, but now is also used by penetration tester.

  • FEATURE
    1)It is built on the Metasploit framework.
    2)A user may launch scans and exploits.
    3)It is used in RED TEAM Operations.
    4)By using one Metasploit instance you will
    a)use the same session.
    b)communication through shared event log.
    c)Run bots to automate red team tasks.
    d)Share hosts captured data and downloaded files.

3)WIRESHARK
It is Another free and open-source packet analyzer. It also has its CLI version ie Tshark.
Wireshark uses pcap to capture packets. It also supports most of the os and also windows os.

  • FEATURE
    1)Live data read from a different network like loopback, IEEE 802.11, Ethernet.
    2)Capture data can be viewed in GUI or in Command Line.
    3)Different filters are their so easy to find the valuable information.
    4)Raw USB traffic also captured.
    5)VOIP call also is captured.
    6)Different color schemes are used so we can easily identify the packets.

4)JOHN THE RIPPER
It is also free and OPEN source software. It is a password cracker tool it is also available in many flavors of UNIX, WINDOWS, DOS, and OpenVMS.

Its main goal is to detect weak password and crack them the best thing is that it comes out of the box with this os.
Jhon the Ripper Pro is also available.
It is one of the most popular password testings and breaking programs it combines a number of password crackers into one package, it detects password hash types and includes a customizable cracker. It can run against various encrypted password formats including several crypt password hash types most commonly found on various Unix version (DES, MD5), Kerberos and windows NT/2000/xp/2003 LM hash.

ATTACK MODE
One of the modes JHON can use is the DICTIONARY ATTACK. It takes wordlist contains a number of common passwords and encrypting it in the same format as the password being examine including both encryption algorithm and key and compare the output to the encrypted string.
It also uses BRUTE FORCE mode. In this type attacker goes through all the possible plaintext, hashing each one and then comparing it to the input hash. It uses character frequently tables to try plaintext containing more frequently used character first. This method can crack the password which does not appear in dictionary wordlist, but it takes time.

5)BURP SUITE
Burp Suite is an Interception Proxy tool. While browsing their target application, a penetration tester can configure their internet browser to route traffic through the Burp Suite proxy server. Burp Suite then acts as a man in the middle who is capturing and analyzing each request to and from the target web application so that they can be analyzed.
Penetration testers can pause, manipulate and replay individual HTTP requests in order to analyze potential parameters or injection points.
Injection points can be specified for manual as well as automated fuzzing attacks to discover potentially unintended application behaviors, crashes and error messages.

  • DIFFERENT MODULES IN BURP SUITE
    a)Target: It contains detail information about your target application and process for testing the vulnerabilities.
    b)Proxy: This is an intercepting web proxy that operates as a man-in-the-middle between the end browser and the target web application. It lets you intercept, inspect and modify the raw traffic passing in both directions.
    c)Spider: This is an intelligent application-aware web spider that can crawl an application to locate its content and functionality.
    d)Scanner: (Professional) This is an advanced web vulnerability scanner, which can automatically discover numerous types of vulnerabilities.
    i)Active Scan ii)Passive Scan
    e)Intruder: This is a powerful tool for carrying out automated customized attacks against web applications. It is highly configurable and can be used to perform a wide range of tasks to make your testing faster and more effective.
    Brute Force attack also perform on the INTRUDER.
    f)Repeater: This is a simple tool for manually manipulating and reissuing individual HTTP requests, and analyzing the application’s responses.
    g)Sequencer: This is a sophisticated tool for analyzing the quality of randomness in an application’s session tokens or other important data items that are intended to be unpredictable.
    h)Decoder: This is a useful tool for performing manual or intelligent decoding and encoding of application data.
    i)Comparer: This is a handy utility for performing a visual “diff” between any two items of data, such as pairs of similar HTTP messages.
    j)Extender: This lets you load Burp extensions, to extend Burp’s functionality using your own or third-party code.
    k)Alerts: This will give you the alerts regarding the tool.

So now we know Kali Linux is loaded with some of the great tools in their arsenal. Which can be used in the Penetration Testing as well as in Hacking.
GREAT POWER COMES WITH GREAT RESPONSIBILITY” So same thing goes with the Kali Linux the tools and the entire framework is too powerful. So you have to handle this with great care because there is a very thin line when you are working in this field if anything goes wrong then its totally your responsibility. So choose wisely.
You can Download KALI LINUX From HERE according to your system requirements.
Further Enquires Contact Khanna Security solutions Pvt Ltd.(KSS)

Want to Know More About Threats Check THIS

Please follow and like us:

Leave a Reply

Your email address will not be published. Required fields are marked *