KALI-LINUX-ABOUT

 KALI LINUX ABOUT

Kali Linux (formerly known as BackTrack Linux) is an open-sourceDebian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. It does this by providing common tools, configurations, and automations which allows the user to focus on the task that needs to be completed, not the surrounding activity.

Kali Linux contains industry specific modifications as well as several hundred tools targeted towards various Information Security tasks, such as Penetration Testing, Security Research, Computer Forensics, Reverse Engineering, Vulnerability Management and Red Team Testing.

Kali Linux is a multi-platform solution, accessible and freely available to information security professionals and hobbyists.

MORE


KALI LINUX

KALI LINUX TOOLS


 A packet sniffer for wireless LANs.
  1. Autopsy A graphical interface to The Sleuth Kit, which aids forensic exploration of hard disks.
  2. Armitage A front end for Metasploit tools that manages attack strategies.
  3. Burp Suite A system that launches man-in-the-middle attacks and includes password cracking.
  4. BeEF The Browser Exploitation Framework tries to break into servers through websites.
  5. Cisco Global Exploiter Attacks Cisco routers and switches.
  6. Ettercap A traffic interceptor designed for man-in-the-middle attacks.
  7. Foremost A command-line disk copying and file recovery tool.
  8. Hashcat A password cracker.
  9. Hydra A password cracker.
  10. John the Ripper A command-line password cracker.
  11. Kismet A network scanner, packet sniffer, and intrusion detection system for wireless networks.
  12. Maltego A data discovery tool that maps relationships between data, including network layouts, social media connections, and software dependencies.
  13. Metasploit Framework Scans targets for endpoints and then builds attacks based on discovered knowledge.
  14. Nikto A command-line Web vulnerability scanner.
  15. Nmap A command-line network scanner and device discovery tool.
  16. OWASP ZAP The Zed Attack Proxy is a Web vulnerability scanner and traffic interceptor.
  17. sqlmap A command-line service for web vulnerability scanning and password cracking.
  18. Wireshark A world-famous packet sniffer.
  19. WPScan A vulnerability scanner for WordPress sites
KALI LINUX ALL COMMANDS PDF 

👇👇👇👇👇👇👇👇

PASSWORD : KGF HACKER