Kali linux

Post on 12-Feb-2017

282 views 0 download

transcript

Kali LinuxPresented by: Alia Bin Touq and Afra al Falasi

Content Page

1. What is Kali? 2. Development3. Supported platforms4. Features5. Popular Culture6. Security-focused operating system

What is Kali?

Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. It is maintained and funded by Offensive Security Ltd. Mati Aharoni, Devon Kearns and Raphaël Hertzog are the core developers.

DevelopmentKali Linux is preinstalled with over 600 penetration-testing programs.

Kali Linux is based on Debian Jessie. Most packages Kali uses are imported from the Debian repositories. Kali Linux is developed in a secure location with only a small number of trusted people that are allowed to commit packages, with each package being signed by the developer.

Supported platforms

Kali Linux is distributed in 32- and 64-bit images for use on hosts based on the x86 instruction set and as an image for the ARM architecture for use on the BeagleBoard computer and on Samsung's ARM Chromebook.

FeaturesKali Linux has a dedicated project set-aside for compatibility and porting to specific Android devices, called Kali Linux NetHunter. It is the first Open Source Android penetration testing platform for Nexus devices, created as a joint effort between the Kali community member “BinkyBear” and Offensive Security. It supports Wireless 802.11 frame injection, one-click MANA Evil Access Point setups, HID keyboard (Teensy like attacks), as well as Bad USB MITM attacks.

Popular Culture

The logo of Kali Linux appears on the background in the activist and cybersecurity related TV series Mr. Robot (2015).

Security-focused operating system

As such, something can be secure without being "security-focused." For example, almost all of the operating systems mentioned here are faced with security bug fixes in their lifetime; however, they all strive to consistently approach all generic security flaws inherent in their design with new ideas in an attempt to create a secure computing environment. Security-focused does not mean security-evaluated operating system, which refers to operating systems that have achieved certification from an external security-auditing organization.

Reference Page