Join Malcolm Shore for an in-depth discussion in this video What is Kali?, part of Learning Kali Linux.
- [Voiceover] Kali is the latest evolution of what started out as a security testing suite called BackTrack. It runs on a wide range of hardware and is used extensively by professional security testers. Kali is a Linux distribution which includes over 300 security testing tools and a graphical interface to make using the main testing tools easier. The main Kali screen has two drop-down menu items on the top bar, Applications and Places, and a set of quick access icons on the left.
The top bar shows the date time in the middle of the bar and when I click on it, I get a pop-up pane with the calendar. The right hand part of the top bar has a number of functions. The first icon shows the number one in a box. Kali supports multiple desktop screens, these are called Workspaces and this icon indicates that I'm using Workspace 1. When I press the Windows key, a pane appears on the right hand side and when I hover over it I can see that I have two active Workspaces.
I'll open up a command shell in Workspace 1. When I select Workspace 2, there's no command shell. I'll go back to Workspace 1 and I'll close the command shell. I'll press the Windows key again to close the pane. The right hand pane is a useful way of navigating between Workspaces. Clicking anywhere further to the right on the top bar displays a pane with the basic setup. I have a wide connection simulated by the use of VirtualBox's NAT Network mode, no proxy and the host's battery states.
I'm logged in a Roots and if I click on the arrow to the right of this, I'll get an additional option to log out. At the bottom of this pane are three icons. Clicking the middle one will lock the Kali screen and require log in, and the right hand one will power down the Kali system. The left hand icon provides access to all the settings in the Kali system. When I click on this, the settings menu item appears on the top bar and the settings pane appears. I don't wish to adjust any settings right now so I'll close this pane.
This course will give prospective ethical hackers a short overview of the tools in Kali Linux. Cybersecurity expert Malcolm Shore shows how to set up a virtual environment for testing, configure Kali Linux, and install toolsets for information gathering, vulnerability assessment, password and hash cracking, and target exploitation.
Because businesses are connected, they are also exposed. Vulnerability testing helps organizations limit that exposure. This course will help you explore the careers, techniques, and tools behind ethical hacking—one of the most competitive and sought-after IT security skills.
- Overview of Metaploit, Maltego, and Wifite
- Setting up a virtual lab with Oracle VM
- Installing virtual machines and appliances
- Exploring the Kali Linux applications
- Gathering information with DMitry and DNSenum
- Conducting a vulnerability assessment
- Installing OpenVAS and Vega
- Testing passwords
- Exploiting targets
Skill Level Beginner
Q: This course was updated on 06/12/2017. What changed?
A: The following topics were updated: setting up a virtual lab, installing appliances, Windows Credential Editor, using John for Windows passwords, pass the hash, using rainbow tables, exploiting with Armitage, pivoting through a network, and getting stealth and persistent access. In addition, a new video was added that shows how to create Trojans with msfvenom.