Вы находитесь на странице: 1из 28

1

Under Guidance By

of Ch.Nithish (2210314610)

Mr.Pavan Kumar Paruchuri(M.tech) M.Vamsi (2210314634)

A BRIEF INTRO TO

KALI SANA
KALI SANA 2

CONTENTS
Introduction
Features
Tools
KALI SANA 3

INTRODUCTION

FIGURE 1.TIMELINE OF KALI LINUX

Developer Offensive Security Ltd.


Latest release 2.0 (Sana), 5 months ago
Kali linux is a Debian-derived
Linux distribution designed for
Supported platforms x86, x86-64, armhf
digital forensics and penetration
Predecessor Backtrack testing
Kernel version 4.0

TABLE 1.BRIEF INTRO TO KALI


KALI SANA 4

WHAT IS DEBIAN-DERIVED?
Debian is one of the oldest distribution of
linux. Kali is derived from it. Hence Debian-
derived.
WHAT IS DIGITAL FORENSICS?
A branch of forensic science,dealing with
evidence in a computer system.
FIGURE 2.A SCREENSHOT OF DEBIAN-J
WHAT IS PENETRATION
TESTING?
It is a software attack on a computer system
Fun Fact:Jessie was the
that looks for security weaknesses, name taken from a
potentially gaining access to the computer's character in Toy story
features and data. movie
KALI SANA 5

FEATURES
Live Support
Live + persistence support
Live + persistence + encryption support
Live + forensics mode
Platform support
Organisation of tools
Detailed documentation
Metapackages
Its own repository
KALI SANA 6

LIVE SUPPORT
OS can be run without
installation.

But data is lost across


reboots.

In this mode,OS runs in


memory(RAM).

Uses in:Data
recovery,high security.

FIGURE 3.A SCREENSHOT OF KALI BOOT MEN


KALI SANA 7

LIVE + PERSISTENCE SUPPORT


Usually booted from USB.
A separate persistence
partition is created to store
data across reboots.

This allows data from a


pentesting or forensic
operation to be saved.

Here is a link on how FIGURE


to 4.A SCREENSHOT OF KALI SANA BOOT
create a persistent USB.
KALI SANA 8

LIVE + PERSISTENCE + ENCRYPTION


The data from a pentesting or forensic operation is very sensitive.
Kali provides encryption,so even if you lose your USB,no one but you can
read the data.
Encryption is LUKS encryption,which stands for Linux Unified Key Setup.

FIGURE 5.A SIMPLE REPRESENTATION OF LUKS ENCRYPTION


KALI SANA 9

LIVE + FORENSICS MODE


Under normal conditions,whenever you insert a USB stick, it
is automatically mounted.

The OS itself interacts with data in it, modifying data.


For a forensic operation, data must be unmodified.
In this mode, external storage devices are not mounted
automatically.
KALI SANA 10

PLATFORM SUPPORT
One of the major advantage of Kali over other pentesting
OSs.

It runs on your laptops/desktops and even on your


smartphones! (armhf devices in general)

Before you know armhf devices, a bit about ISA


KALI SANA 11

WHAT IS ISA?
ISA stands for Instruction Set Architecture. It is a part of the computer architecture
related to programming,registers,addressing modes,native data types,interrupt and
exception handling. An ISA includes specific set of opcodes, native commands
implemented by particular processor.

Your laptop/desktop uses CISC(Complex Instruction Set Computing) architecture.


WHAT ARE ARMHF DEVICES?
armhf is an ISA based on RISC(Reduced Instruction Set Architecture)
architecture,which is designed by ARM holdings.

armhf devices are portable and fast reaching clock speed upto 2.5 Ghz.
KALI SANA 12

All Android smartphones 4.4


and above can run Kali.
But Offensive Security
released a package native to
nexus devices and One plus
one phones.
Several of armhf devices FIGURE 6.RASPBERRY PI RUNNING KALI
include chrome books, single-
board motherboards like
raspberry pi, tablets.

FIGURE 7.NEXUS 9 RUNNING KALI


KALI SANA 13

ORGANISATION OF TOOLS
Kali offers 600+ tools.Such
a large number makes it
overwhelming for user to
work with.

So, they are divided into 13


categories based on their
functions.

List of categories is given in


next slide.
FIGURE 8.TOOLS NEATLY ORGANISED
KALI SANA 14

Information Gathering
Vulnerability Analysis
Web Application Analysis
Database Assessment
Password Attacks
Wireless Attacks
Reverse Engineering
Exploitation tools
Sniffing & Snooping
Post exploitation
Forensics
Reporting Tools
System services
KALI SANA 15

DETAILED DOCUMENTATION
For any features to be useful,the end-user must be able to
use it.Kali is not a beginner-friendly OS.

The documentation has information needed to completely


install Kali or create a persistence(optionally encrypted), to
building your own customised ISO of Kali.

There is also separate section on ARM powered devices.


Here is the link to documentation section of the webpage.
KALI SANA 16

METAPACKAGES
As it stands,full version of Kali Sana is >3 Gb.And all the
tools included are not used by all the people.

So, they put a bare-bone version and you can choose what
set of tools are right for you.

For ex;you can choose only wireless tools,if you know you
only need them.

Here is the link to choose your packages.


KALI SANA 17

ITS OWN REPOSITORY


Kali has its own repository
since its inception.
From backtrack,the Kali team
cut down many tools which are
buggy and redundant in
function.
Each of the tools are signed
by selected few teams and
individuals.So,each and every
tools is bug-free and secure.
FIGURE 9.A SCREENSHOT OF KALI BEING UPD
KALI SANA 18

TOOLS
Many of the tools used by Kali are open-source and free.But
Kali team maintains them bug-free.

In this section, we discuss some of the important tools.


Most of them are Command Line Interface(CLI).i.e. they
don't have a GUI.

A list of common tools are given in next slide.


KALI SANA 19

nmap

metasploit framework

burp suite

hashcat

ophcrack

aircrack-ng

wireshark
KALI SANA 20

NMAP
It is a utility for network discovery and security
auditing.

Many systems and network administrators also


find it useful for tasks such as network inventory,
managing service upgrade schedules, and
monitoring host or service uptime.

Nmap uses raw IP packets in novel ways to


determine what hosts are available on the
network, what services (application name and
version) those hosts are offering, what operating
systems (and OS versions) they are running,
what type of packet filters/firewalls are in use,
and dozens of other characteristics.

It is designed to rapidly scan large networks.


FIGURE 10.ZENMAP
KALI SANA 21

FEATURES OF NMAP
Flexibleadvanced techniques for mapping out networks.
Powerfuldesigned to scan a network of literally thousands of
machines.
Well-documentednmap community grows daily and its
documentation section is well maintained.
Portablenmap works on all platforms,Windows,Linux and Mac OS.
There is a GUI version called zenmap,which share same code as
nmap.
KALI SANA 22

METASPLOIT FRAMEWORK
It is a tool for developing and
executing exploit code against a
remote target machine.

It uses modular approach


choosing code that
enters,choosing code that
executes,choosing encoding
technique so that you cant be
caught.

This tool makes use of


knowledge of target operating
system,known from nmap or
otherwise. FIGURE 11.A SCREENSHOT OF METASPLOIT FRAM
KALI SANA 23

BURP SUITE
It is a Java application that can
be used to secure or penetrate
web applications.

It lets you inspect and modify


traffic between your browser and
the target application.

It can be automated for the


detection of numerous types of
FIGURE 12.A SCREENSHOT OF BURP SUIT
vulnerability.

Individual requests from a


browser can be manipulated.
KALI SANA 24

HASHCAT
It is the self-proclaimed worlds fastest CPU based password
recovery tool.

It supports Microsoft LM hashes,MD4,MD5,SHA-


family,MySQL,etc.

It offers several complex and effective attack modes.


Ex:Brute force,which is permutation and combination of
alphabets,numerals,special characters.

The above method is outdated and replaced with Mask attack.


KALI SANA 25

OPHCRACK
It is a windows password
cracking program using LM
hashes using rainbow tables.

On most computers, ophcrack


can crack most passwords
within a few minutes.

Free rainbow tables are


available.

LiveCD is available to simplify


the process.

FIGURE 13. A SCREENSHOT OF OPHCRACK LIV


KALI SANA 26

AIRCRACK-NG
Aircrack-ng is a complete suite of tools to
assess WiFi network security.

It focuses on different areas of WiFi


security:

Monitoring: Packet capture and export


of data to text files for further
processing by third party tools.

Attacking: Replay attacks,


deauthentication, fake access points
and others via packet injection.

Testing: Checking WiFi cards and driver


capabilities (capture and injection).

Cracking: WEP and WPA PSK (WPA 1 FIGURE 14.SOME OF THE


and 2).
COMMANDS USED IN
AIRCRACK-NG
KALI SANA 27

WIRESHARK
It is a packet analyser.

It is used for network


troubleshooting, analysis, software
and communications protocol
development, and education.

Live data can be read from a


number of types of networks,
including Ethernet, IEEE 801.11,
PPP, and loopback.

VoIP calls in the captured traffic


can be detected. If encoded in a FIGURE 15.A SCREENSHOT OF WIRESHARK
compatible encoding, the media
flow can even be played.
KALI SANA 28

BIBLIOGRAPHY
www.wikipedia.org

www.nmap.org

www.kali.org

www.wireshark.org

www.kali.org/kali-linux-documentation/

www.tools.kali.org/kali-metapackages

Вам также может понравиться