Kali Linux 1 | PenTest Extra 05/2013

On March 13th, the BackTrack successor, Kali Linux, has bPenTest_Extra_04_2013een released. Was this moment a revolution in pentesting? How the capacities of our toolkits have changed?What can we do now that we were not able to do previously?

Some answers have already appeared in our magazine.. But Kali is being mentioned more and more often among our Authors and Readers andthis pentesting OS’ story!

After the BackTrack Compendium here comes a great continuation of these pentesting OS ‘story!

Want to know experts’ opinions? Read about the pros and cons? Differences between Kali and its predecessor? Or maybe you want to try it yourself?

Explore practical advices! Follow step-by-step manuals! Benefit from our Authors’ experience!

What will you find inside? Experts will share with you information such as the password attacks, the top Linux tools Kali, Kali pentesting wireless with linux and much, much more.

Especially for you, we have interviewed a pentesting specialist – Dan Dieterle – author of many different publications and book “Basic Security Testing with Kali”.

What else you can find? Just open the issue and see for yourself!

This text is available for purchase but you need to login or register first.
You can buy this for 30 USD
Please register for free account or subscribe and get access to all issues on this website!
Buy a subscription and get access to all issues on our website
Create Free Account



Too Short Hint: Use upper and lower case characters, numbers and symbols like !"?$%^&( in your password.

A password will be e-mailed to you.




Too Short Hint: Use upper and lower case characters, numbers and symbols like !"?$%^&( in your password.

A password will be e-mailed to you.

Log In

Remember Me


What is Kali? by Albert López

It’s a fact that these last years the Backtrack distribution has been the most used by security professionals and enthusiasts. Its path started right in 2006 and for seven years it was improved while gaining its place in the security community. Therefore, nowadays it’s hard to find someone interested in computer security that has not listened about Backtrack.


Comparison of Kali Linux and prevous BackTrack versions by Gilad Ofir

As Pen testers and information security specialists, we often use various tools to help us secure our systems, infrastructures and networks. One of the most used Swiss-knife tools is called Backtrack that had its name changed to Kali. In this article, we will compare the new Kali to its predecessors in various categories, see the benefits we can get from Kali, and look at various tools and examples that Kali provides us.


Top 5 Kali Linux Tools You Absolutely Must Use by Paul Alkema

Kali Linux is full of new features that its predecessor BackTrack lacked. These features include many new penetration testing tools, streamlined security updates, Debian compliant packaged tools, installations that can be automated using pre-seed files, seamless updates to future versions, multi-lingual support, and support for ARM hardware.


Kali Linux by Kim Carter

When it comes to measuring the security posture of an application or network, the best defence against an attacker is offence. What does that mean? It means your best defence is to have someone with your best interests (generally employed by you), if we’re talking about your asset, assess the vulnerabilities of your asset and attempt to exploit them.


The Ultimate Installation Guide for Kali Linux by Aamir Lakhani

The Offensive Security team has released a new penetration testing Linux distribution named Kali Linux. BackTrack 5 RC3 was the last version of the BackTrack distributions. The project contributors have decided that to move forward with the challenges of cyber security and modern testing, a new platform was needed. Kali Linux was born and released March 13th 2013. Kali Linux is based on Debian and an FHS-Compliant file system.




The Password Attacks by Davide Peruzzi

What is the weakest part of the security chain? You know the answer: the one who stand between the keyboard and the desk chair. And what does this user do on her/his first job day? Set a password. Yes, a big part of our security environment lies around that password.


Pentesting Wireless with Kali Linux by Hitesh Choudhary

Wireless pentesting is a comparatively new domain as compared to network or web pentesting. Many of the beginners, who are highly enthusiastic towards pentesting, specially towards wireless hacking, the first thing that pops into the mind is to hack into the wireless key and access a free internet.


Kali Linux on a Raspberry Pi by Scott Christie

The Raspberry Pi is a small low cost computer originally designed as an educational tool to teach children about computing. The Raspberry Pi now has a large following of hobbyists and hackers using the little computer for various projects from home theater PCs to home appliance automation. While the Raspberry Pi does not have the greatest specs by contemporary computing standards, it does have a tiny form factor and at $35.00, it is hard to find a better value.


Interview with Dan Dieterle by Milena Bobrowska

Especially for you, we have interviewed a pentesting specialist – Dan Dieterle – author of many different publications (some of them appeared in PenTest Magazine). He has just finished writing a book called “Basic Security Testing with Kali” and on this occasion he agreed to answer a few questions related to his book and the future of pentesting.


Comments are closed.