Transcript Kali Linux

Kali Linux
BY BLAZE STERLING
Roadmap

What is Kali Linux

Installing Kali Linux

Included Tools

In depth included tools

Conclusion
What is Kali Linux?


Advanced penetration testing
and security auditing linux
distribution

300+ build in penetration testing
tools

Free / Open source

FHS (File Hierarchy Standard)
compliant

Secure development environment
Spin off of Backtrack
Using Kali Linux




Install to hard disk

10 GB disk space

USB / CD-DVD
Live USB Install

2GB capacity

Win32 Disk Imager
Android 2.1 + devices

5 GB free space

Network install
Virtual Machine

Run in side another OS
Included Kali Tools


Information Gathering

Dnsdict6

Nmap

Urlcrazy
IDS/IPS (Intrusion
Detection/Protection System)



Fragrouter
Network Scanners

Dnmap

Netdiscover
Traffic Analysis

intrace
Included tools continued




Vulnerability Analysis

Cisco tools

Yersinia
Web Vulnerability Scanner

ProxyStrike

Cadaver
Wireless Attacks

Bluelog

Spooftooph
Wireless Tools

Aircrack
Information Gathering Tools
DNSDICT6

Finds all sub-domains of a website
or web server

Enumerates all IPv4 and IPv6
addresses to extract dumps

Sub-domains

IP information

Powerful for extracting sub
domains that are restricted

Tutorials Online

Google

Youtube
Information Gathering Tools NMap

Security Scanner

Gordon Lyon

Discovers hosts and services on a
computer network and creates a
map of the network

Special Packets

Analyzes reponses

Host discovery

Service discovery

Operating system detections
IDP / IPS Fragrouter

Intercepts, Modifies, and rewrites
traffic destined for a specified host

Routes network traffic in a way
that eludes IDS

Uses

Test IDS timeout and reassembly

Test TCP/IP scrubbing

Test firewalls

Evade Passive OS fingerprinting
Network Scanners DNMap

Framework for distributing nmap
scans among many clients

Client/Server architecture

Server knows what to do

Clients do it

Clients work when server is offline

Real time statistics of the clients
and their targets

Scans very large networks quickly
Traffic Analysis Intrace

Works along the same lines as
Fragrouter

Enumerates IP hops exploiting TCP
connections to display the path of
packets over the network

Network reconnaissance


Who is connected to who
Firewall bypassing
Vulnerability Analysis Cisco Auditing
Tool

Perl script that scans cisco routers
for common vulnerabilities

Default passwords, usernames

Easy to guess names and
passwords

IOS bug history

Hijack a router

Test router security

Password

username
Web Vulnerability Scanner
ProxyStrike

Active web application proxy
designed to find vulnerabilities
while browsing a web application

Mainly javascript

Sql injection and XSS plugins

Listens to port 8008 and analyzes
all the parameters of applications
running in the port for
vulnerabilities
Wireless Attacks Bluelog

Bluetooth scanner and logger with
optional web front-end designed
for site surveys and traffic
monitoring

One of the only ones with a UI

Find devices with Bluetooth
enabled

Records logs of all traffic over
Bluetooth
Wireless Tools Aircrack

802.11 WEP and WPA-PSK key
cracking program that can
recover keys once enough data
packets have been captured

Steal internet

Gain unauthorized network access

One of the fastest network key
cracking softwares
Conclusion



Security focused Linux Distribution

300+ security tools

Spin off of popular backtrack
Multiple ways to run

Hard drive

USB / Live CD

Virtual Machine
Detailed Look at some tools

To many to cover them all
References

http://www.hackingloops.com/2013/03/dnsdict6-hack-tool-tutorialknow-your-backtrack.html

http://www.kali.org/official-documentation/

http://zer0byte.com/2013/03/19/kali-linux-complete-tools-listinstallation-screen-shots/

http://en.wikipedia.org/wiki/Nmap

http://www.monkey.org/~dugsong/fragroute/

http://santoshdudhade.blogspot.com/2012/10/cisco-auditing-toolv1-perl-script.html