Posts

Kali Linux By Komal

 Role of Kali in Hacking: Kali linux is renowned for hacking tools and techniques. It is considered to be the operating system of hackers. To some extent this is true. Kali linux offers us a wide variety of tools and techniques which can be utilized in hacking. Around 600 tools are present in kali linux [1]. This phenomenal feature of Kali OS not only facilitates the hackers, but are helpful for the blue teamers of organizations to make their security structure stronger.  We will discuss some techniques used by cyber attackers to carry out malicious activities. We will then mention few tools of kali Linux which can be utilized by the attackers.  1. Reconnaissance: These is the first step of attack. In this step the attackers find out some useful information about the victim. This useful information includes the weaknesses which can be further exploited to gain access to the victim. Kali linux offers us a variety of tools to carry out reconnaissance [2].  Kali Linux Tools: Recon-ng

Kali Linux

Image
  Blog Post 1 – KALI LINUX Blog by Komal   Introduction: Data and information security has become one of the main concerns in this era of technology and continuous network usage. Technology is only accessible using operating system. There have been many operating systems in the market some are paid and some are open source. Every operating system has their own benefits, Kali Linux is the front runner in the hacking tools. Kali Linux is based on Linux distribution, it has built-in and open-source tools that perform many functions which are helpful in penetrations, performing detailed research about the security of the system and reverse engineering however needed, Kali Linux is a byproduct of BackTrack, it basically has all the features of BackTrack with irrelevant features excluded. All the features of BackTrack which have worked in the past have been included in Kali Linux. Each and every feature of the operating system is changeable but once modified, the network has an inb