Ad
related to: kali linux basics for hackers by occupytheweb
Search results
Results From The WOW.Com Content Network
Kali Linux is a Linux distribution designed for digital forensics and penetration testing. [4] It is maintained and funded by Offensive Security . [ 5 ] The software is based on the Debian Testing branch: most packages Kali uses are imported from the Debian repositories . [ 6 ]
Kali NetHunter is a free and open-source mobile penetration testing platform for Android devices, based on Kali Linux. [1] Kali NetHunter is available for non-rooted devices (NetHunter Rootless), [2] for rooted devices that have a standard recovery (NetHunter Lite), and for rooted devices with custom recovery for which a NetHunter specific kernel is available (NetHunter). [3]
Offensive Security Certified Professional (OSCP, also known as OffSec Certified Professional) is an ethical hacking certification offered by Offensive Security (or OffSec) that teaches penetration testing methodologies and the use of the tools included with the Kali Linux distribution (successor of BackTrack). [1]
Kali is an IPX network emulator for DOS and Windows, enabling legacy multiplayer games to work over a modern TCP/IP network such as the Internet. Later versions of the software also functioned as a server browser for games that natively supported TCP/IP.
Offensive Security (also known as OffSec) [1] is an American international company working in information security, penetration testing and digital forensics.Operating from around 2007, [2] the company created open source projects, advanced security courses, the ExploitDB vulnerability database, and the Kali Linux distribution.
BackTrack was a Linux distribution that focused on security, based on the Knoppix Linux distribution aimed at digital forensics and penetration testing use. [4] In March 2013, the Offensive Security team rebuilt BackTrack around the Debian distribution and released it under the name Kali Linux .
Hydra (or THC Hydra) is a parallelized network login cracker built into various operating systems like Kali Linux, Parrot and other major penetration testing environments. [2] It was created as a proof of concept tool, for security researchers to demonstrate how easy it can be to crack logins.
A number of Linux distributions include known OS and application vulnerabilities, and can be deployed as targets to practice against. Such systems help new security professionals try the latest security tools in a lab environment. Examples include Damn Vulnerable Linux (DVL), the OWASP Web Testing Environment (WTW), and Metasploitable.