Kali Linux – What’s new?
By Steven McLaughlin, Security Researcher
Kali Linux released earlier in the year is dubbed the most advanced penetration testing distribution, ever. How does it compare to BackTrack?, and: What’s the difference?
Kali Linux for Enterprises
By Navneet Sharma, Information Security Analyst
Whenever we think of Penetration Testing (PT) the first name that comes to our mind is “Backtrack (BT)”, which we have been using for the last few years. Backtrack, funded by offensive Security (www.offensive –Security.com), is also one of the most popular UBUNTU Linux based platform, with collection of organized security testing tools such as Open-VAS, maltigo, Metasploit Framework (MSF), etc. Last release to Backtrack series was Backtrack 5 R2 with codename Revolution.
Kali Linux is the latest linux distribution made for penetration testing by and used by security assessors and hackers. Kali Linux is also considered as a successor to Backtrack.
Weaponization of Android Platform using Kali Linux
By Daniel Singh, Independent Consultant in network and systems security
Kali Linux has become the most popular tool for professional penetration testing and security auditing. In this article, we will review how to couple the functionality of Kali Linux with Android platform over HTC One X smartphone to create an invincible penetration-testing weapon.
Kali Linux, Attacking Servers
By Ismael Gonzalez D., Security Researcher, CEH, MCP, MCDTS, MCSA, LPIC-1
This article will show you how to perform attacks on web servers, getting full access to the system and database. Just by using some of the ‘Top Ten’ tools of Kali Linux.
Hands On: How to Create “Backdoor” to Remote Access with Kali Linux, DNS Spoofing Attack with Ettercap and Cloning Sites with Kali Linux
By Rafael Fontes Souza, Co-Founder at Grey Hats, member of the “French Backtrack Team”
The three articles describe very useful tools in Kali and cover the ideas of creating backdoor, how to perform the spoof attack and how to clone websites with SET Attack Method.
Kali Scanning for HIPAA – A Proof of Concept: using Kali Linux to deploy distributed network vulnerability scanners for medical clients
By Charlie Waters, Security Officer and Senior Consultant for Infinity Network Solutions
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) requires organizations who handle electronic Protected Health Information (e-PHI) to take action and reduce risk relative to potential security breaches of digital communication and storage of patient information. Open Source solutions can be leveraged as a low-cost and effective strategy to minimize risk when used as component of a larger information security program. With a long “track” record of community support, Kali is an open source Linux distribution containing many security tools to meet the needs of HIPAA network vulnerability scans.
KALI LINUX- A Solution to HACKING/SECURITY
By Deepanshu Khanna, Linux Security Researcher
Today is the world of technology and everyone somehow is attached to it. Some are using the technology for the good purpose and some are using it for bad purposes and Internet is one of those technologies which define both my statements. Internet is being used both by the good (the White Hats) and the bad (the Black Hats). So, my paper is totally based on the above line that the OS (Operating System) KALI LINUX (which is an extension to Backtrack) can be used in both the ways either for good or bad.
Take a Closer Look at Hakin9′s Tutorials Written by Professionals and Gain Expert Skills in Kali Linux!
Tagged with: aircrack-ng • Android • Android Exploitation • audit • backtrack • Backtrack 5 • black hat • Cloning websites with SET • cracking • debian • DNS Spoofing • ethereal • Ettercap • experts • hacking • hakin9 • hakin9 magazine • hakin9 nmap • HIPPA • HTC • IT audit • IT security • john the ripper • kali linux • kali linux master • Kali Scanning • linux • linux development • live cd • Metasploit • Metasploit Project. • Nmap • offensive security • password cracking • pen tester • pentest • pentest magazine • Pentesting • Pentesting with Kali Linux • raspberry Pi • Security Auditing • SET • SET Attack • smartphone • Top Ten Tools in Kali • ubuntu • white hat • wifi • wireless devices • wireshark
Comments are closed.