Jump to content

Kali Linux

From Wikipedia, the free encyclopedia
(Redirected from Cisco Global Exploiter)
Kali Linux
DeveloperOffensive Security
OS familyLinux (Unix-like)
Working stateActive
Source modelOpen-source
Initial release13 March 2013 (11 years ago) (2013-03-13)[1]
Latest release2024.3[2] Edit this on Wikidata / 11 September 2024; 60 days ago (11 September 2024)
Repository
Update methodRolling release
Package managerAPT (several front-ends available)
Platformsx86, x86-64, armel, armhf
Kernel typeMonolithic (Linux)
Default
user interface
Xfce,[3] GNOME,[3] KDE[3]
LicenseGNU General Public License v3.0
Official websitewww.kali.org
Support status
Active

Kali Linux is a Linux distribution designed for digital forensics and penetration testing.[4] It is maintained and funded by Offensive Security.[5] The software is based on the Debian Testing branch: most packages Kali uses are imported from the Debian repositories.[6] The tagline of Kali Linux and BackTrack is "The quieter you become, the more you are able to hear", which is displayed on some backgrounds, see this example.

Kali Linux has approximately 600[7] penetration-testing programs (tools), including Armitage (a graphical cyber attack management tool), Nmap (a port scanner), Wireshark (a packet analyzer), metasploit (penetration testing framework), John the Ripper (a password cracker), sqlmap (automatic SQL injection and database takeover tool), Aircrack-ng (a software suite for penetration-testing wireless LANs), Burp suite and OWASP ZAP web application security scanners,[8][9] etc.[10]

It was developed by Mati Aharoni and Devon Kearns of Offensive Security through the rewrite of BackTrack, their previous information security testing Linux distribution based on Knoppix.[citation needed] Kali Linux's popularity grew when it was featured in multiple episodes of the TV series Mr. Robot. Tools highlighted in the show and provided by Kali Linux include Bluesniff, Bluetooth Scanner (btscanner), John the Ripper, Metasploit Framework, Nmap, Shellshock, and Wget.[11][12][13]

Version history

[edit]

The first version, 1.0.0 "moto", was released in March 2013.[1]

With version 2019.4 in November 2019, the default user interface was switched from GNOME to Xfce, with a GNOME version still available.[3]

With version 2020.3 in August 2020, the default shell was switched from Bash to ZSH, with Bash remaining as an option.[14]

Requirements

[edit]

Kali Linux requires:

  • A minimum of 20GB hard disk space for installation, depending on the version. Version 2020.2 requires at least 20GB.[15]
  • A minimum of 2GB RAM for i386 and AMD64 architectures.
  • A CD-DVD drive, USB stick or other bootable media.
  • A minimum of an Intel Core i3 or an AMD E1 processor for good performance.

The recommended hardware specification for a smooth experience are:

  • 50 GB of hard disk space, SSD preferred.
  • At least 2GB of RAM.

Supported platforms

[edit]

Kali Linux is distributed in 32-bit and 64-bit images for use on hosts based on the x86 instruction set and as an image for the ARM architecture for use on the Beagle Board computer and Samsung's ARM Chromebook.[16]

The developers of Kali Linux aim to make Kali Linux available for more ARM devices.[17]

Kali Linux is already available for Asus Chromebook Flip C100P, BeagleBone Black, HP Chromebook, CubieBoard 2, CuBox, CuBox-i, Raspberry Pi, EfikaMX, Odroid U2, Odroid XU, Odroid XU3, Samsung Chromebook, Utilite Pro, Galaxy Note 10.1, and SS808.[18]

With the arrival of Kali NetHunter, Kali Linux is also officially available on Android devices such as the Nexus 5, Nexus 6, Nexus 7, Nexus 9, Nexus 10, OnePlus One, and some Samsung Galaxy models. It has also been made available for more Android devices through unofficial community builds.

Kali Linux is available on Windows 10, on top of Windows Subsystem for Linux (WSL). The official Kali distribution for Windows can be downloaded from the Microsoft Store.[19]

Features

[edit]

Kali Linux has a dedicated project set aside for compatibility and porting to specific Android devices, called Kali NetHunter.[20]

It is the first open source Android penetration testing platform for Nexus devices, created as a joint effort between the Kali community member "BinkyBear" and Offensive Security. It supports Wireless 802.11 frame injection, one-click MANA Evil Access Point setups, HID keyboard (Teensy like attacks), as well as Bad USB MITM attacks.[20]

BackTrack (Kali's predecessor) contained a mode known as forensic mode, which was carried over to Kali via live boot. This mode is very popular for many reasons, partly because many Kali users already have a bootable Kali USB drive or CD, and this option makes it easy to apply Kali to a forensic job. When booted in forensic mode, the system doesn't touch the internal hard drive or swap space and auto mounting is disabled. However, the developers recommend that users test these features extensively before using Kali for real world forensics.[21]

Comparison with other Linux distributions

[edit]

Kali Linux is developed with a focus towards cyber security experts, penetration testers, and white-hat hackers. There are a few other distributions dedicated to penetration testing, such as Parrot OS, BlackArch, and Wifislax. Kali Linux has stood out against these other distributions for cyber security and penetration testing,[22] as well as having features such as the default user being the superuser in the Kali Live Environment.[23]

Tools

[edit]

Kali Linux includes security tools, such as:[7][24][25][26][27][28][29][30][31]

These tools can be used for a number of purposes, most of which involve exploiting a victim network or application, performing network discovery, or scanning a target IP address. Many tools from the previous version (BackTrack) were eliminated to focus on the most popular and effective penetration testing applications.

Offensive Security provides a book, Kali Linux Revealed,[32] and makes it available for free download.[33]

See also

[edit]

References

[edit]
  1. ^ a b "Official Kali Linux Releases". Archived from the original on 2020-02-02. Retrieved 2020-08-29.
  2. ^ "Kali Linux 2024.3 Release (Multiple transitions) | Kali Linux Blog". 11 September 2024. Retrieved 11 September 2024.
  3. ^ a b c d Nestor, Marius (26 November 2019). "Kali Linux Ethical Hacking OS Switches to Xfce Desktop, Gets New Look and Feel". softpedia. Archived from the original on 2020-06-30. Retrieved 2019-11-29.
  4. ^ *"Kali Linux 1.0 review". LinuxBSDos.com. 2013-03-14. Archived from the original on 2019-07-12. Retrieved 2019-11-26.
  5. ^ *Watson, J.A. (2014-05-28). "Hands-on with Kali Linux 1.0.7". ZDNet.com. Archived from the original on 2018-02-27. Retrieved 2019-04-10.
  6. ^ "Kali's Relationship With Debian". Kali Linux. 2013-03-11. Archived from the original on 2018-07-02. Retrieved 2019-04-10.
  7. ^ a b "Kali Linux Penetration Testing Tools". tools.kali.org. Archived from the original on 2021-09-24. Retrieved 2019-04-10.
  8. ^ "Kali Linux Metapackages". www.kali.org. 26 February 2014. Archived from the original on 2016-04-23. Retrieved 2019-12-22.
  9. ^ "Kali Linux arrives as enterprise-ready version of BackTrack - The H Open: News and Features". www.h-online.com. Archived from the original on 2016-03-14. Retrieved 2019-12-22.
  10. ^ "Mr. Robot and Kali Linux". 29 December 2020. Archived from the original on 4 May 2023. Retrieved 27 June 2022./
  11. ^ Leroux, Sylvain (3 May 2017). "The Kali Linux Review You Must Read Before You Start Using it". itsfoss.com. Archived from the original on 2020-04-14. Retrieved 2020-04-15.
  12. ^ Grauer, Yael (2015-08-26). "A Peek Inside Mr. Robot's Toolbox". Wired. ISSN 1059-1028. Archived from the original on 2015-09-08. Retrieved 2020-04-15.
  13. ^ "Exploring the Hacker Tools of Mr Robot". HackerTarget.com. 2015-08-21. Archived from the original on 2019-12-17. Retrieved 2020-04-15.
  14. ^ "Kali Linux 2020.4 Release". www.kali.org. 18 November 2020. Archived from the original on 2021-01-29. Retrieved 2021-01-12.
  15. ^ "Kali Linux Hard Disk Install". Kali Linux Official Documentation. Archived from the original on 2020-05-19. Retrieved 2020-05-28.
  16. ^ Pauli, Darren (2013-03-13). "BackTrack successor Kali Linux launched". SC Magazine. Archived from the original on 2019-04-10. Retrieved 2019-04-10.
  17. ^ Orin, Andy (2014-12-03). "Behind the App: The Story of Kali Linux". Lifehacker. Archived from the original on 2021-10-20. Retrieved 2019-04-10. Mati Aharoni: One of our goals with Kali is to provide images of the operating system for all sorts of exotic hardware—mainly ARM based. This includes everything from Raspberry Pi's to tablets, to Android TV devices, with each piece of hardware having some unique property.
  18. ^ "04. Kali Linux on ARM". Archived from the original on 2019-11-25. Retrieved 2019-09-04.
  19. ^ muts (2018-03-05). "Kali Linux in the Windows App Store". Kali Linux. Archived from the original on 2021-01-23. Retrieved 2019-04-10.
  20. ^ a b "Kali Linux NetHunter for Nexus and OnePlus". Archived from the original on 2017-01-02. Retrieved 2019-04-10.
  21. ^ "Kali Linux Forensics Mode". Archived from the original on 2019-11-25. Retrieved 2019-04-10.
  22. ^ Gray, Lerma (12 February 2021). "11 Best Linux Distros For Hacking And Penetration Testing in 2021 – dev.Count". Archived from the original on 2022-05-21. Retrieved 2022-05-02.
  23. ^ "Kali's Default Credentials | Kali Linux Documentation". Kali Linux. Archived from the original on 2022-04-15. Retrieved 2022-05-02.
  24. ^ "Burp Suite - Application Security Testing Software". portswigger.net. Archived from the original on 2003-09-22. Retrieved 2023-09-29.
  25. ^ "BeEF - The Browser Exploitation Framework Project". beefproject.com. Archived from the original on 2023-09-26. Retrieved 2023-09-29.
  26. ^ "cisco-global-exploiter | Kali Linux Tools". Kali Linux. Archived from the original on 2023-10-01. Retrieved 2023-09-29.
  27. ^ "sqlmap: automatic SQL injection and database takeover tool". sqlmap.org. Archived from the original on 2008-09-19. Retrieved 2023-09-29.
  28. ^ "WPScan: WordPress Security Scanner". wpscan.com. Archived from the original on 2023-09-29. Retrieved 2023-09-29.
  29. ^ Reverse Engineer's Toolkit, Mente Binária, 2023-09-28, archived from the original on 2023-10-04, retrieved 2023-09-29
  30. ^ dev-gsniper (2023-09-27), Reverse-Engineering-toolkit, archived from the original on 2023-09-27, retrieved 2023-09-29
  31. ^ "Vulnerable By Design ~ VulnHub". www.vulnhub.com. Archived from the original on 2023-09-29. Retrieved 2023-09-29.
  32. ^ Hertzog, Raphael; O'Gorman, Jim; Aharoni, Mati (2017-06-05). Kali Linux Revealed: Mastering the Penetration Testing Distribution. Offsec Press. ISBN 978-0-9976156-0-9. Archived from the original on 2024-05-21. Retrieved 2020-03-17.
  33. ^ Kali Linux Revealed (PDF). Archived from the original (PDF) on 2021-01-02. Retrieved 2020-03-17.
[edit]