Kali Linux: How to use of Kali Linux?
What is Kali Linux?
Kali
Linux is a Defiant based Linux distribution, aimed at advanced Penetration
Testing and security icing detection. There are several hundred tools in Kali
that are geared towards various information security functions such as
penetration testing, security research, computer forensics and reverse
engineering. Kali Linux, a leading information security training company, is
funded and maintained by Aggressive Security.
Kali
Linux was introduced on March 13, 2013 as a complete, top-to-bottom rebuild of
Backtrack Linux, sticking solely to Defiant development standards.
Contains
more than Tenet૦૦
penetration testing tools: After reviewing each tool included in the backtrack,
we eliminated a number of tools that either did not work or copied other tools
that provided similar or similar functionality. Details on what's included are
on the Cali Tools site.
Free
(like beer) and always will be: KKL Linux, like Backtrack, is completely free
and always will be. You never have to pay for Kali Linux.
Open
Source Git Tree: We are committed to the open source development model and our
development tree is available for all to see. All source code that goes into
Linux for Linux is available to anyone who wants to tweak or recreate packages
that fit their specific requirements.
FHS
compliant: Cali, the file system complies with the Hierarchy Standard, allowing
Linux users to easily find binaries, support files, libraries, and more.
Wide-ranging
wireless device support: A regular sticking point with Linux distributions is
supported for the wireless interface. We've built Kali Linux to support as many
wireless devices as possible, which allow it to run properly on a variety of
hardware and make it compatible with numerous USB and other wireless devices.
Custom
kernel, patched for injection: As an intrusion tester, the development team
often requires a wireless evaluation, so our kernel includes the latest
injection patches.
Developed
in a secure environment: The Kali Linux team is made up of a small group of
individuals who are trusted to send only packages and interact with
repositories, all of which are done using multiple secure protocols.
GPG
Signed Packages and Repositories: Each package in Kali Linux is signed by each
individual developer who created and committed it, and repositories also sign
packages later.
Multi-language
support: Although penetration tools are written in English, we have ensured
that Cali includes true multilingual support, allowing more users to manage
their native language and find the tools needed for the job.
Fully
customizable: We understand well that not everyone will agree with our design
decisions, so we've made it easy for our more adventurous users to customize
Kali Linux to their liking, by all means.
ARMEL
& ARMHF Support: ARM-based single-board systems, such as Raspberry Pi and
Beagle bone Black, are becoming more and more prevalent and inexpensive, among
others, so we know that tomorrow's ARM support needs to be as robust as both.
With fully functional installations for ARMEL and ARMHF systems. Kali Linux is
available on a wide range of ARM devices and has ARM repositories integrated
with the main distribution so that equipment for the arm is updated along with
the rest of the distribution.
Kali
Linux is specifically tailored to the needs of intrusion test professionals and
therefore all documentation on this site generally assumes prior knowledge and
familiarity with the Linux operating system. Please see should I use Kali
Linux? For more details on what makes Cali unique.
