Kali Linux is a Debian-based Linux distribution designed for digital forensics and penetration testing. It is maintained by Offensive Security and is a rewrite of their previous distribution, BackTrack. Kali Linux includes over 600 penetration testing tools and can run natively, from a live USB/CD, or in a virtual machine. It is specialized for penetration testing and forensics, unlike the more general purpose Ubuntu distribution. Common penetration testing tools included are nmap, Wireshark, John the Ripper, and Aircrack-ng for wireless assessments. Packet injection allows sending frames in monitor mode for wireless attacks like impersonation and deauthentication. The Alfa Network wireless adapter is often used for wireless hacks with its high
Kali Linux is a Debian-derived distribution for digital forensics and penetration testing, developed by Offensive Security. It is a rewritten version of BackTrack.
Penetration testing evaluates systems to identify vulnerabilities, simulating attacks from unauthorized users.
Kali Linux offers over 600 tools for penetration testing, multilingual support, full customization, and compatibility with various devices.
Kali Linux can be installed on hard drives, run from live CDs/USBs, virtual machines, and supports ARM devices.
Kali Linux is specialized for penetration testing, while Ubuntu is a general-purpose distribution for desktops and servers.
Kali Linux includes tools like nmap, Wireshark, and John the Ripper, making it comprehensive for security professionals.
Aircrack-ng is essential for wireless penetration testing, featuring commands for wireless card control and packet capturing.
Packet injection allows higher control in wireless communication for effective attacks, utilizing Monitor mode for data sending.
For wireless hacking, the Alfa Network AWUS036NH adapter is utilized, known for its high power and range.
KALI LINUX isa Debian-derived Linux distribution designed for digital forensics and
penetration testing.
It is maintained and funded by Offensive Security Ltd. It was developed by MatiAharoni
and Devon Kearns of Offensive Security
 It is the rewrite of BackTrack, their previous forensics Linux distribution.
KALI LINUX:PENETRATION TESTING
OPERATING SYSTEM
3.
What is PenetrationTesting?
“The process of evaluating systems ,
applications , and protocols with the intent of
identifying vulnerabilities usually from the
perspective of an unprivileged or anonymous
user to determine potential real world
impacts…”
Or in other words
… trying to break into stuff before the bad guys
do…
4.
Features of KALILINUX
• Has more than 600 penetration testing tools.
• Multilingual Support
• Completely Customizable.
• Free and Always will be.
• Vast Wireless device support and Compatible
with USB.
• ARM support-Kali Linux has ARM repositories
integrated with mainline distribution.
5.
Flexibility of KALILINUX
• Kali Linux can run natively when installed on
a computer’s hard disk or,
• Can be booted from a live CD or a live USB or,
• It can run within a virtual machine.
• Available for ARM devices like Samsung
Chromebook, Samsung Galaxy Note 10.1,
Raspberry Pi and a lot more.
• KALI LINUX can also be installed within a root
environment on an android device.
6.
Difference between KaliLinux and
Ubuntu
Ubuntu
• Ubuntu is a general
desktop and server
distribution.
• Designed to satisfy general
Desktop and Server
requirements and also
targeted in some Smart
TV’s.
• Developed by Canonical
Ltd. and released back in
2004.
Kali Linux
• Kali Linux is a specialized
distribution.
• Primarily designed for
purposes like Penetration
Testing and Digital
Forensics.
• Developed by Offensive
Security Ltd. and released
on 13th March 2013.
7.
DIFFERENT SOFTWARES FOR
PENTESTING
KaliLinux is preinstalled with over 600 penetration-testing
programs.
For eg-
nmap (a port scanner),
 Wireshark (a packet analyzer),
 John the Ripper (a password cracker),
 Aircrack-ng (a software suite for penetration-testing wireless
LANs)
Kali Linux can run natively when installed on a computer's hard
disk, can be booted from a live CD or live USB, or it can run within
a virtual machine.
8.
USE OF KALILINUX FOR HACKFLY
WIRELESS HACKING WITH KALI LINUX
Aircrack-ng
Aircrack-ng is the de facto penetration tool suite – essential for any wireless penetration tests or
assessments.
COMMANDS USED:
Airmon-ng-:the tool used to put wireless cards into monitor mode
Airodump-ng :is used for packet capturing of raw 802.11 frames
Aireplay-ng: is used to inject frames.
Airtun-ng :is a virtual tunnel interface creator
Airbase-ng: is multi-purpose tool aimed at attacking clients as opposed to the Access Point (AP)
itself.
Aircrack-ng:recover keys once enough data packets have been captured
9.
What is theneed and purpose of
packet injection within WiFi attacks
Wireless networks work in predefined modes and come with strict functional
restrictions.
Wireless attacks require a higher control over the lower layers of
communication in order to send and receive any kind of data.
 In the default mode (Station Infrastructure Mode),, you can't even directly
talk to a different client in default mode.
For more control, you need Monitor mode to listen to any communication in
the air.
This is where packet injection comes in.
Packet injection means sending data while in Monitor mode because it's a
passive-only mode .
10.
Sending and receivingmanagement and control
frames is necessary for impersonating base stations
and clients, and for listening to frames that are
meant for specific adapters.
 The dreadful deauthentication frame, apart from
the DoS(denial of service attack) can also be
injected, it's the first stage in a multi-stage attack.
11.
HARDWARE USED
Network Adapterfor wireless network hack
Model-: Alfa Network AWUS036NH 2000mW High Power Wireless N 802.11bgn Wi-Fi USB
Adapter with 5dBi Antenna