Kali
Kali
1. Kali 2018.1 – 6th February, 2018 – The first 2018 Kali Rolling release.
Kernel 4.14.12, GNOME 3.26.2
2. Kali 2017.3 – 21st November, 2017 – The third 2017 Kali Rolling release.
Kernel 4.13, GNOME 3.26
3. Kali 2017.2 – 20th September, 2017 – The second 2017 Kali Rolling
release. Kernel 4.12, GNOME 3.25.
4. Kali 2017.1 – 25th April, 2017 – The first 2017 Kali Rolling release.
Kernel 4.9, GNOME 3.22.
5. Kali 2016.2 – 31st August, 2016 – The second Kali Rolling release.
Kernel 4.6, GNOME 3.20.2.
6. Kali 2016.1 – 21st January, 2016 – The first Kali Rolling release. Kernel
4.3, GNOME 3.18.
1. Kali 2.0 – 11th August, 2015 – Major release, “safi”, now a rolling distribution, major UI
changes.
2. Kali 1.1.0a – 13th March, 2015 – No fanfare release fixing kernel ABI inconsistencies in
the installers.
3. Kali 1.1.0 – 9th Febuary, 2015 – First dot release in 2 years. New kernel, new tools
and updates.
4. Kali 1.0.9a – 6th October, 2014 – Security BugFix release covering shellshock and
Debian apt vulnerabilities.
5. Kali 1.0.9 – 25th August, 2014 – BugFix release including installer and a set of
tool updates and package fixes.
6. Kali 1.0.8 – 22nd July, 2014 – EFI Support for our “full” ISOs and a set of tool updates
and package fixes.
7. Kali 1.0.7 – 27th May, 2014 – Kernel 3.14, tool updates, package fixes,
Kali Live Encrypted USB Persistence.
8. Kali 1.0.6 – 9th January, 2014 – Kernel 3.12, cryptsetup nuke option, Amazon AMI, ARM build scripts.
1. Kali 1.0.5 – 5th September, 2013 – BugFix rollup.
LVM Encrypted installs, Software Defined Radio (SDR) tools.
2. Kali 1.0.4 – 25th July, 2013 – BugFix rollup.
Penetration testing tool additions and updates.
3. Kali 1.0.3 – 26th April, 2013 – BugFix rollup. New accessibility features.
Added live Desktop installer.
4. Kali 1.0.2 – 27th March, 2013 – Minor BugFix release and update
roll-up.
5. Kali 1.0.1 – 14th March, 2013 – Minor BugFix release (USB Keyboard
).
6. Kali 1.0.0 – 13th March, 2013 – Initial release, “moto”.
@Overview:~#
Using open source hacking tools comes with a major
drawback. They contain a whole lot of dependencies when
installed on Linux, and they need to be installed in
predefined sequence: authors of some tools have not
released accurate documentation.
@Overview:~#
Kali Linux simplifies this process: it contains many tools preinstalled
with all the dependencies and are in ready-to-use condition so that
you can pay more attention for the actual attack and not on
installing the tool. Updates for tools installed in Kali Linux are more
frequently released. Which helps you to keep the tools up to date. A
noncommercial toolkit that has all the major hacking tools pre-
installed to test real-world networks and applications is very usefull
for ethical hackers. This enables hackers to spend more time on
finding the actual flaws rather than building a toolkit.
@System_Requirements:~#
1. A minimum of 20 GB disk space for the Kali
2. Linux install.
3. RAM for i386 and amd64 architectures, minimum: 1GB,
recommended: 2GB or more.
4. CD-DVD Drive / USB boot support
@Design_Goals:~#
1. Take responsibility for the user’s experience - Design with
understanding that a user’s needs change frequently while they work
and play
4. The technology should act as a mediator - “Be the vehicle, not the
destination”“Strive for transparency”
4. Design a self-teaching interface for beginners, and an efficient
interface for advanced users, but optimize for intermediates - Balance
learnability and discoverabilty utility
Large Address Spaces The operating system makes the system appear as if it
has a larger amount of memory than it actually has.
Protection Each process in the system has its own virtual address space. These
virtual address spaces are completely separate from each other and so a process
running one application cannot affect another.
@File_Management:~#
FHS compliant: Kali adheres to the Filesystem Hierarchy Standard, allowing
Linux users to easily locate binaries, support files, libraries, etc.
@Process_Management
Graphical User Interface
6 Types of modules
Payloads
Exploits
Post
Nops
auxillary
encoders
SOCIAL ENGINEERING TOOLKIT
open-source Python-
driven tool aimed at
penetration testing
around Social-
Engineering.
specifically designed
to perform advanced
attacks against the
human element
Examples of SEC attacks
1. Spear-Phishing Attack Vectors
-allows you to send e-mails with a malicious file as payload
2. Website Attack Vectors
-allows you to create a malicious website link.
3. Infectious Media Generator
-creates a payload and a .ini file for a usb, cd or dvd injection
4. Create a Payload and Listener
-creates a .exe file and opens a listener
5. Mass Mailer Attack
-send e-mails to the target
6. Ardiuno Based Attack
-For use with a “Teensy usb”
7. SMS Spoofing Attack
-craft sms messages and send them
That’s it