Kali Linux Quick Guide – Learn Kali Linux in simple and easy steps starting from basic to advanced concepts with examples including Installation and Configuration, Information Gathering, Vulnerability Analyses Tools, Wireless Attacks, Website Penetration Testing, Exploitation, Forensics, Reporting, Stressing, Password Cracking Tools, Social Engineering, Kali linux tutorial pdf download and Spoofing, Maintaining Access, Reverse Engineering. Kali Linux, Tutorial, Learning, Installation and Configuration, Information Gathering, Vulnerability Analyses Tools, Wireless Attacks, Website Penetration Testing, Exploitation, Forensics, Reporting, Stressing, Password Cracking Tools, Social Engineering, Sniffing and Spoofing, Maintaining Access, Reverse Engineering. Kali Linux is one of the best security packages of an ethical hacker, containing a set of tools divided by the categories.
Generally, Kali Linux can be installed in a machine as an Operating System, as a virtual machine which we will discuss in the following section. Installing Kali Linux is a practical option as it provides more options to work and combine the tools. You can also create a live boot CD or USB. The latest release is Kali 2016.
1 and it is updated very often. First, we will download the Virtual box and install it. Later, we will download and install Kali Linux distribution. A Virtual Box is particularly useful when you want to test something on Kali Linux that you are unsure of. Running Kali Linux on a Virtual Box is safe when you want to experiment with unknown packages or when you want to test a code. OS which can MAC or Windows or another flavor of Linux. Let’s understand how you can download and install the Virtual Box on your system.
Depending on your operating system, select the right package. In this case, it will be the first one for Windows as shown in the following screenshot. The next page will give you options to choose the location where you want to install the application. Select the features you want to be installed and click Next. The Virtual Box application will now open as shown in the following screenshot. Now we are ready to install the rest of the hosts for this manual and this is also recommended for professional usage.
Now that we have successfully installed the Virtual Box, let’s move on to the next step and install Kali Linux. The following screenshot pops up. It is important to keep updating Kali Linux and its tools to the new versions, to remain functional. Following are the steps to update Kali. It will ask if you want to continue. In this section, we will set up another testing machine to perform the tests with the help of tools of Kali Linux. Register by supplying your details.
After filling the above form, we can download the software. A screen to create a virtual machine pops up. In this chapter, we will discuss the information gathering tools of Kali Linux. NMAP and ZenMAP are useful tools for the scanning phase of Ethical Hacking in Kali Linux.
NMAP and ZenMAP are practically the same tool, however NMAP uses command line while ZenMAP has a GUI. NMAP is a free utility tool for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Now, let’s go step by step and learn how to use NMAP and ZenMAP.
Next, open the TCP and UDP ports. TCP ports that have to be scanned. In green are all the TCP open ports and in red are all the closed ports. However, NMAP does not show as the list is too long.
ACK frame is received back, then it’s assumed the target would complete the connect and the port is listening. If an RST is received back from the target, then it is assumed the port isn’t active or is closed. Searchsploit is a tool that helps Kali Linux users to directly search with the command line from Exploit database archive. DNS tools that Kali has incorporated. Basically, these tools help in zone transfers or domain IP resolving issues. PERL script that helps to get MX, A, and other records connect to a domain.