Kali Linux

Kali Linux

[vc_row type=”in_container” full_screen_row_position=”middle” scene_position=”center” text_color=”dark” text_align=”left” overlay_strength=”0.3″][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ width=”2/3″ tablet_text_alignment=”default” phone_text_alignment=”default”]

Let´s talk about Kali Linux

kali-linux$ The ring to rule them all…

Here´s where you start to understand how hackers get you, how the magic happen, you must understand how they do it to know how to protect yourself.

Forget all those ideas about a program that you download from Softonic to install it in 2min and then press the button “Hack Girlfriend´s Facebook ad her email too”.

To start we will need tools and their are contained in a great OS called Kali Linux, it´s a Devian derived designed for Penetration Testing. It has over 300 penetration-testing programs, including Armitage (the GUI of Metasploit), nmap (a port scanner), Wireshark (a packet analyzer), John the Ripper (a password cracker), Aircrack-ng (a software suite for penetration-testing wireless LANs), Burp suite and OWASP ZAP (both web application security scanners). Kali Linux can run natively when installed on a computer’s hard disk, can be booted from a live CD or live USB, or it can run within a virtual machine. It is a supported platform of the Metasploit Project‘s Metasploit Framework, a tool for developing and executing security exploits.

It was developed by Mati Aharoni and Devon Kearns of Offensive Security through the rewrite of BackTrack, their previous forensics Linux distribution based on Knoppix. The third core developer Raphaël Hertzog joined them as Debian expert.[4][5]

To have a look of this project on https://www.kali.org
It also has a certification to do if you wanna managed as a master called Penetration Testing with Kali Linux and OSCP is another great certification to get.

You can download the lasted version here: Download Kali linux and we´ll also need Virtual Machine to run Kali and start to know it, so I also recommend you to download VirtualBox.

 

learn, learning, the best security practice, ethical hacking, IT, Admin, Administrator, Server, User, Kali Linux, Phone, Download, Blog, WordPress, Free, Lab, Pentest, Pentester

[/vc_column][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ width=”1/3″ tablet_text_alignment=”default” phone_text_alignment=”default”][image_with_animation image_url=”1734″ alignment=”center” animation=”Fade In” box_shadow=”none” max_width=”100%” delay=”400″][team_member image_url=”1722″ team_memeber_style=”meta_below” link_element=”none” color=”Accent-Color” name=”Daniel Morales” job_position=”Writer”][/vc_column][/vc_row][vc_row type=”full_width_background” full_screen_row_position=”middle” bg_color=”#f9f9f9″ scene_position=”center” text_color=”dark” text_align=”left” top_padding=”4%” bottom_padding=”3%” overlay_strength=”0.3″][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ width=”1/1″ tablet_text_alignment=”default” phone_text_alignment=”default”][recent_posts style=”default” category=”all” columns=”3″ title_labels=”true” posts_per_page=”3″][/vc_column][/vc_row]

Share it:

Leave a Reply

Your email address will not be published. Required fields are marked *