Skip to main content

Kali Linux review and a brief history of the BackTrack

Looks like Kali Linux is a great success. Kali Linux is the successor to BackTrack, the much loved Linux Penetration Distro/ Operating System that is aimed at penetration testers and security professionals. Before we dive into our brief review – we thought it would be cool to give a brief history of how Kali Linux came to be.
What is the history of Kali Linux and BackTrack?
We are all very familiar with Backtrack, which has been around for the last seven years – created and managed by Offensive Security, but what is the history of this famous Linux penetration testing distribution?
Much like we trace our ancestors back to Africa, so we trace Kali Linux back to Knoppix! Knoppix was one of the first ever bootable Live Linux Distro’s. Still in existence, Knoppix is a classic distro with a loyal community. Over time the Knoppix project was forked into WHoppix (yes the WH are meant to be capitalized) that was then re-forked into WHAX. WHAX was then re-branded and streamlined into the BackTrack that we all used. There is a common thread throughout these distros, (Knoppix, which became WHoppix, and then WHAX and finally into BackTrack); that is that the lineage focused on intrusion detection and digital forensics. BackTrack expanded the scope and allowed for many more tools to be incorporated into the distro. In any event, BackTrack had a long reign of almost seven years as the pentesters and hackers distro of choice. However, as of March 2013 the venerated distro was decommissioned and replaced by Kali Linux. Phew. Long story – but the bottom line is that Kali Linux is the result of a rich and colorful history.
So why bother changing the name?
Kali Linux is so different that the fine folks over at Offensive Security thought that to solve the ‘inherent problems’ of BackTrack the authors needed a complete re-write. The main issue with BackTrack v1-v5 was that it was a headache for dependencies. Here was the problem: too many pentesting tools embedded within BackTrack all struggled to co-exist within the dependencies. Many pentesting and security tools where not regularly updated by their creators so the result was that trying to update the entire OS often caused conflicts and tools would simply stop working, crash or even cause other tools to crash. A good example of this is Ettercap which was not updated for a long time.
The solution was to rebuild the distro bottom-up by making Kali Debian based. Before with BackTrack there was a /pentest/ folder, whereas now it is all updated and managed by Debian packages.
Kali Linux has 300 tools which automatically work within the Kali ecosphere. Kali also has been created with the clean “File system Hierarchy Standard” and offers vast plug and play wireless support, with the only exception appearing to be broadcom.
ARM Support
Another interesting feature about Kali Linux is that it supports ARM architecture meaning that you can use the distro on Raspberry Pi’s and Chromebooks etc. Incidentally, you can also create your own .iso file with Kali through the Debian lifebuild feature.
In summary
Kali is a well thought out penetration testing distribution which had to address its’ previous problems with regards to updates. The distro has two modes: forensics and default, all of which run best (in our opinion) in gnome. All the usual pentesting tools work with the distro with ease and the file hierarchy is the same as previous BackTrack versions – so you won’t have a problem using this distro if you are previous BackTracker. Offensive Security still insist that you run the OS as root so this probably won’t be your day to day distroFor pentesting Kali Linux is clearly an awesome OS with the world’s best pentesting suite of tools that can all be preconfigured. Couple that with the very large and loyal community, bug tracking service and attention to detail and yes, it is a solid pentesting Linux distribution.

Comments


  1. Nobody deserves a liar as a partner so kindly contact this hacker named Evans Webroot to help you hack into your patners pone device or computer so you can see things that your patner might have been hiding from you. Contact via ( Webroothacker@gmail.com ) or whatsapp +1 (917)275-0978.

    ReplyDelete
  2. Never met any hacker as discreet and fast like this White Collar Hackers. They are called WhiteHats and they has helped me in multiple ways first was when my ex spouse cheated on me- they got me every information from my spouse phone number and now they are helping me paying my credit cards debts. They have the best hacking tools plus service any one can ever imagine and I recommend him to the world. I am thankful and grateful for the second chance. Honestly, WhiteCollar hackers are life savers please contact them here if you need their swift service Email; WhitehatspytechATcyberservicesDOTcom

    ReplyDelete

Post a Comment

plz add ur comment here

Popular posts from this blog

Wordpress hacking - How to install / run wpscan on windows xp / windows 7 / windows 10

HOW TO RUN WPSCAN ON WINDOWS Byrockstardevil Requirements: rubyinstaller Development Kit for rubyinstaller curl DLL for windows : libcurl.dll 1 - install rubyinstaller you must have Ruby 2.2.3 version . download links here : http://rubyinstaller.org/downloads/ for more info : https://github.com/oneclick/rubyinstaller/wiki 2 - install Development Kit for rubyinstaller download link : http://rubyinstaller.org/downloads/ how to install : https://github.com/oneclick/rubyinstaller/wiki/Development-Kit if you face that problem  "unknown encoding name -  (ArgumentError)" just type "chcp 1252" in cmd and hit enter 3 - install libcurl.dll A - Download libcurl.dll from : http://www.confusedbycode.com/curl/ B - copy libcurl.dll copy  libcurl.dll into ruby bin folder or wpscan folder and make sure to add it to your PATH. I also added .DLL to PATHEXT ex : C:\Ruby21-x64\bin\ you can visit : http://www.computerhope.com/issues/ch000549.htm to know to set the p

How To Generate Random IP Address Using JAVA ?

Today I'll Show You How To Generate Random IP Address... But First Why I Want This...Right...? Ans : If You Want Test Your Code That Whether It Is Recognizing The Machine By It’s IP Address Then You Had To Use This Code To Generate Random IP Address. So Here We Goooo.... private String generateIPAddress ( int p1 , int p2 , int p3 ) { StringBuilder sb = null ; Random r1 = new Random (); Random r2 = new Random (); Random r3 = new Random (); Random r4 = new Random (); String ip1 = Integer . toString ( b1 ); String ip2 = Integer . toString ( b2 ); String ip3 = Integer . toString ( b3 ); String ip4 = Integer . toString ( b4 ); String b1 = IpConverter . longToIp ( r1 . nextLong ()); String b2 = IpConverter . longToIp ( r2 . nextLong ()); String b3 = IpConverter . longToIp ( r3 . nextLong ()); String b4 = IpConverter . longToIp ( r4 . nextLong ()); //Now the I

3 Ways to Root Android 7.0 Nougat on Nexus Running Official AOSP [Update: Root Android 7.1]

3 Ways to Root Android 7.0 Nougat on Nexus Running Official AOSP [Update: Root Android 7.1] If you own a Nexus phone then chances are you have already updated your device with the latest official Android 7.0 Nougat firmware. This brings the newer firmware build number NRD90M to the Nexus range including the Nexus 5X, 6P, 9, 6, Nexus Player, and the Pixel C. Unfortunately, Nexus 5 and 7 were left behind. This has been a game-changing week for the Android community as you can now expect the new software for your Android device soon enough. It may either come officially from a manufacturer or unofficially from developers like CyanogenMod. Just like we saw the unofficial support for the  Nexus 5 and the Nexus 7  today. As the new AOSP source code is now available to developers, soon you may find Cyanogen 14 based custom ROMS releasing for several devices. Hence, to be ready, you may need to be rooted and also setup a custom recovery like TWRP on your device. So that once the CM 14 bas