Tools of Kali Linux || All Kali Linux Tools
INTRODUCTION
Kali Linux is
a Debian-based Linux distribution aimed at advanced Penetration Testing and
Security Auditing. Kali contains several hundred tools which are geared towards
various information security tasks, such as Penetration Testing, Security
research, Computer Forensics and Reverse Engineering. Kali Linux is developed,
funded and maintained by Offensive Security, a leading information security training company.
Kali Linux was released on the 13th March,
2013 as a complete, top-to-bottom rebuild of BackTrack Linux, adhering completely
to Debian development
standards.
·
More than 600
penetration testing tools included: After reviewing
every tool that was included in BackTrack, we eliminated a great number of
tools that either simply did not work or which duplicated other tools that
provided the same or similar functionality. Details on what’s included are on
the Kali Tools site.
·
Free (as in beer) and
always will be: Kali Linux, like
BackTrack, is completely free of charge and always will be. You will never,
ever have to pay for Kali Linux.
·
Open source Git tree: We are committed to the open source development
model and our development tree is available for all to see. All of the
source code which goes into Kali Linux is available for
anyone who wants to tweak or rebuild packages to suit their
specific needs.
·
FHS compliant: Kali adheres to the Filesystem
Hierarchy Standard, allowing Linux users
to easily locate binaries, support files, libraries, etc.
·
Wide-ranging wireless
device support: A regular
sticking point with Linux distributions has been supported for wireless
interfaces. We have built Kali Linux to support as many wireless devices as we
possibly can, allowing it to run properly on a wide variety of hardware and
making it compatible with numerous USB and other wireless devices.
·
Custom kernel, patched
for injection: As penetration
testers, the development team often needs to do wireless assessments, so our
kernel has the latest injection patches included.
·
Developed in a secure
environment: The Kali Linux
team is made up of a small group of individuals who are the only ones trusted
to commit packages and interact with the repositories, all of which is
done using multiple secure protocols.
·
GPG signed packages
and repositories: Every package in
Kali Linux is signed by each individual developer who built and
committed it, and the repositories subsequently sign the packages as well.
·
Multi-language
support: Although
penetration tools tend to be written in English, we have ensured that Kali
includes true multilingual support, allowing more users to operate in
their native language and locate the tools they need for the job.
·
Completely
customizable: We
thoroughly understand that not everyone will agree with our design
decisions, so we have made it as easy as possible for our more adventurous
users to customize Kali Linux to their liking, all the way down to the kernel.
·
ARMEL and ARMHF
support: Since ARM-based
single-board systems like the Raspberry Pi and BeagleBone Black, among others,
are becoming more and more prevalent and inexpensive, we knew that Kali’s ARM support would need to be
as robust as we could manage, with fully working installations for both ARMEL and ARMHF systems. Kali
Linux is available on a wide range of ARM
devices and has ARM repositories integrated with
the mainline distribution so tools for ARM are updated in conjunction with
the rest of the distribution.
Kali Linux is specifically tailored to the
needs of penetration testing professionals, and therefore all documentation on
this site assumes prior knowledge of, and familiarity with, the Linux operating
system in general.
NOW IF YOU ARE INTERESTED TO USE KALI LINUX THEN LEARN HOW TO INSTALL KALI LINUX
USING KALI LINUX
Kali Linux is very simple to use, you have to give some time for learning it. Kali Linux is not a complicated operating system, if you have used the normal windows then you should know that Kali Linux can be also used in the same procedures. It has that same preferences as that was in Windows XP, Vista, 7, 8 or further.
The real thing to learn about kali linux that makes you a ethical hacker is how to use the wide variety of tools available in kali linux. My blog is full of all that tools you need and easy method to learn what is it and how can you use them.
Comments
Post a Comment