On March 13th, the BackTrack successor, Kali Linux, has been released. Was this moment a revolution in pentesting? How the capacities of our toolkits have changed?What can we do now that we were not able to do previously?
Some answers have already appeared in our magazine.. But Kali is being mentioned more and more often among our Authors and Readers andthis pentesting OS’ story!
After the BackTrack Compendium here comes a great continuation of these pentesting OS ‘story!
Want to know experts’ opinions? Read about the pros and cons? Differences between Kali and its predecessor? Or maybe you want to try it yourself?
Explore practical advices! Follow step-by-step manuals! Benefit from our Authors’ experience!
What will you find inside? Experts will share with you information such as the password attacks, the top Linux tools Kali, Kali pentesting wireless with linux and much, much more.
Especially for you, we have interviewed a pentesting specialist – Dan Dieterle – author of many different publications and book “Basic Security Testing with Kali”.
What else you can find? Just open the issue and see for yourself!
TABLE OF CONTENTS
What is Kali? by Albert López
It’s a fact that these last years the Backtrack distribution has been the most used by security professionals and enthusiasts. Its path started right in 2006 and for seven years it was improved while gaining its place in the security community. Therefore, nowadays it’s hard to find someone interested in computer security that has not listened about Backtrack.
Comparison of Kali Linux and prevous BackTrack versions by Gilad Ofir
As Pen testers and information security specialists, we often use various tools to help us secure our systems, infrastructures and networks. One of the most used Swiss-knife tools is called Backtrack that had its name changed to Kali. In this article, we will compare the new Kali to its predecessors in various categories, see the benefits we can get from Kali, and look at various tools and examples that Kali provides us.
Top 5 Kali Linux Tools You Absolutely Must Use by Paul Alkema
Kali Linux is full of new features that its predecessor BackTrack lacked. These features include many new penetration testing tools, streamlined security updates, Debian compliant packaged tools, installations that can be automated using pre-seed files, seamless updates to future versions, multi-lingual support, and support for ARM hardware.
Kali Linux by Kim Carter
When it comes to measuring the security posture of an application or network, the best defence against an attacker is offence. What does that mean? It means your best defence is to have someone with your best interests (generally employed by you), if we’re talking about your asset, assess the vulnerabilities of your asset and attempt to exploit them.
The Ultimate Installation Guide for Kali Linux by Aamir Lakhani
The Offensive Security team has released a new penetration testing Linux distribution named Kali Linux. BackTrack 5 RC3 was the last version of the BackTrack distributions. The project contributors have decided that to move forward with the challenges of cyber security and modern testing, a new platform was needed. Kali Linux was born and released March 13th 2013. Kali Linux is based on Debian and an FHS-Compliant file system.
The Password Attacks by Davide Peruzzi
What is the weakest part of the security chain? You know the answer: the one who stand between the keyboard and the desk chair. And what does this user do on her/his first job day? Set a password. Yes, a big part of our security environment lies around that password.
Pentesting Wireless with Kali Linux by Hitesh Choudhary
Wireless pentesting is a comparatively new domain as compared to network or web pentesting. Many of the beginners, who are highly enthusiastic towards pentesting, specially towards wireless hacking, the first thing that pops into the mind is to hack into the wireless key and access a free internet.
Kali Linux on a Raspberry Pi by Scott Christie
The Raspberry Pi is a small low cost computer originally designed as an educational tool to teach children about computing. The Raspberry Pi now has a large following of hobbyists and hackers using the little computer for various projects from home theater PCs to home appliance automation. While the Raspberry Pi does not have the greatest specs by contemporary computing standards, it does have a tiny form factor and at $35.00, it is hard to find a better value.
Interview with Dan Dieterle by Milena Bobrowska
Especially for you, we have interviewed a pentesting specialist – Dan Dieterle – author of many different publications (some of them appeared in PenTest Magazine). He has just finished writing a book called “Basic Security Testing with Kali” and on this occasion he agreed to answer a few questions related to his book and the future of pentesting.