Hacking is an art, and it takes years of practice to master it. So how to get started? Having no idea about hacking is okay.If you want to be a hacker, you have to work hard. So how to get started? If you have installed Kali Linux-the official tool of a hacker.
Hacking
Hacking is an attempt to exploit a computer system or a
 private network inside a computer. Simply put, it is the unauthorised 
access to or control over computer network security systems for some 
illicit purpose.To better describe hacking, one needs to first understand hackers. One 
can easily assume them to be intelligent and highly skilled in 
computers. In fact, breaking a security system requires more 
intelligence and expertise than actually creating one. There are no hard
 and fast rules whereby we can categorize hackers into neat 
compartments. However, in general computer parlance, we call them white 
hats, black hats and grey hats. 
White hat: A hacker who gains access(authorized) 
to systems with a view to identify and fix weaknesses. They may also 
perform penetration testing and vulnerability assessments. 
Black hat: A hacker who gains unauthorized 
access to computer systems for personal gain. The intent is usually to 
steal corporate data, violate privacy rights, transfer funds from bank 
accountsand much more worse things..
Grey hat: A hacker who is in between ethical and black 
hat hackers. He/she breaks into computer systems without authority with a
 view to identify weaknesses and reveal them to the system owner or use it for personal gains
Why Ethical Hacking?
- Information is one of the most valuable assets of an organization. Keeping information secure can protect an organization’s image and save an organization a lot of money.
 - Ethical hacking puts them a step ahead of the cyber criminals who would otherwise lead to loss of business.
 
What is Kali Linux?
Kali Linux
 is a Debian-based Linux distribution aimed at advanced Penetration 
Testing and Security Auditing. Kali contains several hundred tools which
 are geared towards various information security tasks, such 
as Penetration Testing, Security research, Computer Forensics and 
Reverse Engineering. Kali Linux is developed, funded and maintained by Offensive Security, a leading information security training company.Kali Linux was released on the 13th March, 2013 as a complete, top-to-bottom rebuild of BackTrack Linux, adhering completely to Debian development standards.
Features Of Kali Linux
More than 600 penetration testing tools included:
 After reviewing every tool that was included in BackTrack, we 
eliminated a great number of tools that either simply did not work or 
which duplicated other tools that provided the same or similar 
functionality. Details on what’s included are on the Kali Tools site.
Free and always will be: Kali Linux, like BackTrack, is completely free of charge and always will be. You will never, ever have to pay for Kali Linux.
Open source Git tree: All of the source code which goes into Kali Linux is available for anyone who wants to tweak or rebuild packages to suit their specific needs.
FHS compliant: Kali adheres to the Filesystem Hierarchy Standard, allowing Linux users to easily locate binaries, support files, libraries, etc.
Wide-ranging wireless device support: A regular sticking point with Linux distributions has been supported for wireless interfaces. We have built Kali Linux to support as many wireless devices as we possibly can, allowing it to run properly on a wide variety of hardware and making it compatible with numerous USB and other wireless devices.
Custom kernel, patched for injection: As penetration testers, the development team often needs to do wireless assessments, so our kernel has the latest injection patches included.
Developed in a secure environment: The Kali Linux team is made up of a small group of individuals who are the only ones trusted to commit packages and interact with the repositories, all of which is done using multiple secure protocols.
GPG signed packages and repositories: Every package in Kali Linux is signed by each individual developer who built and committed it, and the repositories subsequently sign the packages as well.
Multi-language support: Although penetration tools tend to be written in English, we have ensured that Kali includes true multilingual support, allowing more users to operate in their native language and locate the tools they need for the job.
Completely customizable: You can customize your kali linux system like the way you want.Its is highly customizable
Free and always will be: Kali Linux, like BackTrack, is completely free of charge and always will be. You will never, ever have to pay for Kali Linux.
Open source Git tree: All of the source code which goes into Kali Linux is available for anyone who wants to tweak or rebuild packages to suit their specific needs.
FHS compliant: Kali adheres to the Filesystem Hierarchy Standard, allowing Linux users to easily locate binaries, support files, libraries, etc.
Wide-ranging wireless device support: A regular sticking point with Linux distributions has been supported for wireless interfaces. We have built Kali Linux to support as many wireless devices as we possibly can, allowing it to run properly on a wide variety of hardware and making it compatible with numerous USB and other wireless devices.
Custom kernel, patched for injection: As penetration testers, the development team often needs to do wireless assessments, so our kernel has the latest injection patches included.
Developed in a secure environment: The Kali Linux team is made up of a small group of individuals who are the only ones trusted to commit packages and interact with the repositories, all of which is done using multiple secure protocols.
GPG signed packages and repositories: Every package in Kali Linux is signed by each individual developer who built and committed it, and the repositories subsequently sign the packages as well.
Multi-language support: Although penetration tools tend to be written in English, we have ensured that Kali includes true multilingual support, allowing more users to operate in their native language and locate the tools they need for the job.
Completely customizable: You can customize your kali linux system like the way you want.Its is highly customizable


No comments:
Post a Comment