Kali linux

 Kali Linux is one of the best open-source security packages of an ethical hacker, containing a set of tools divided by categories. Kali Linux can be installed in a machine as an Operating System, which is . Installing Kali Linux is a practical option as it provides more options to work and combine the tools. So now that we know about Kali Linux, we would proceed into knowing some  more of it.


INSTALLATION:
It is by far the best security packages an ethical hacker can have.

To install kali Linux, we can do the following :

  -To install and download virtual box.

-      - After, we can download kali Linux distribution.

(T((The whole process of installing Kali Linux will be discussed on a different article.)

GATHERING INFORMATION:

In this section, we would discuss about certain information gathering tools of kali Linux:

STEALTH SCAN : It does not complete the TCP three way handshake so it can also be called half open scan. An SYN/ACK packet is send by the hacker to the target, if the SYN/ACK frame packet is received back it is assumed the target would complete the connect and port is listening. But, if an RST is received back, then it is assumed that the port isn't active.

NMAP AND ZENMAP: Used for the scanning phase of Ethical Hacking in Kali Linux. NMAP and ZENMAP are kind of same tool, but NMAP uses command line and while ZENMAP uses GUI (Graphical User Interface).

SEARCHSPLOIT: Helps kali Linus users to directly search with command line from exploit database archive.

DNS tools These tools helps in zone transfer or Domain IP resolving issues.

LBD tools: LBD (Load Balancing Detector) tools are very interesting as they detect i a given domain uses DNS and/or HTTP load balancing. It is important because if you have two servers, one of them may not be updated and you may try to exploit it.

Hping3:  Hping3 is widely used by ethical hackers. It is nearly similar to ping tools but is more advanced, as it can bypass the firewall filter and use TCP, UDP, ICMP and RAW-IP protocols. It has a traceroute mode and the ability to send files between a covered channel.

The next part of KALI LINUX will be uploaded on a different article where we will discuss about vulnerability analysis tools and much more.

Comments

Popular posts from this blog

OOP Assignment 3 helping materials

Square root Algorithm in C++

OOP lab 7 task solution