Kali Linux – What’s new?
By Steven McLaughlin, Security Researcher

Kali Linux released earlier in the year is dubbed the most advanced penetration testing distribution, ever. How does it compare to BackTrack?, and: What’s the difference?

Kali Linux for Enterprises
By Navneet Sharma, Information Security Analyst

Whenever we think of Penetration Testing (PT) the first name that comes to our mind is “Backtrack (BT)”, which we have been using for the last few years. Backtrack, funded by offensive Security (www.offensive –Security.com), is also one of the most popular UBUNTU Linux based platform, with collection of organized security testing tools such as Open-VAS, maltigo, Metasploit Framework (MSF), etc. Last release to Backtrack series was Backtrack 5 R2 with codename Revolution.
Kali Linux is the latest linux distribution made for penetration testing by and used by security assessors and hackers. Kali Linux is also considered as a successor to Backtrack.


Weaponization of Android Platform using Kali Linux
By Daniel Singh, Independent Consultant in network and systems security

Kali Linux has become the most popular tool for professional penetration testing and security auditing. In this article, we will review how to couple the functionality of Kali Linux with Android platform over HTC One X smartphone to create an invincible penetration-testing weapon.

Kali Linux, Attacking Servers
By Ismael Gonzalez D., Security Researcher, CEH, MCP, MCDTS, MCSA, LPIC-1

This article will show you how to perform attacks on web servers, getting full access to the system and database. Just by using some of the ‘Top Ten’ tools of Kali Linux.

Hands On: How to Create “Backdoor” to Remote Access with Kali Linux, DNS Spoofing Attack with Ettercap and Cloning Sites with Kali Linux
By Rafael Fontes Souza, Co-Founder at Grey Hats, member of the “French Backtrack Team”

The three articles describe very useful tools in Kali and cover the ideas of creating backdoor, how to perform the spoof attack and how to clone websites with SET Attack Method.


Kali Scanning for HIPAA – A Proof of Concept: using Kali Linux to deploy distributed network vulnerability scanners for medical clients
By Charlie Waters, Security Officer and Senior Consultant for Infinity Network Solutions

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) requires organizations who handle electronic Protected Health Information (e-PHI) to take action and reduce risk relative to potential security breaches of digital communication and storage of patient information. Open Source solutions can be leveraged as a low-cost and effective strategy to minimize risk when used as component of a larger information security program. With a long “track” record of community support, Kali is an open source Linux distribution containing many security tools to meet the needs of HIPAA network vulnerability scans.

By Deepanshu Khanna, Linux Security Researcher

Today is the world of technology and everyone somehow is attached to it. Some are using the technology for the good purpose and some are using it for bad purposes and Internet is one of those technologies which define both my statements. Internet is being used both by the good (the White Hats) and the bad (the Black Hats). So, my paper is totally based on the above line that the OS (Operating System) KALI LINUX (which is an extension to Backtrack) can be used in both the ways either for good or bad.

Take a Closer Look at Hakin9′s Tutorials Written by Professionals and Gain Expert Skills in Kali Linux!


April 19, 2022
Notify of
Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.
What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4


We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.