![]() ![]() By identifying the architecture you can proceed to the installation In the Kali installation, you must first evaluate what architecture it belongs to if it is ARM, i386, amd64. Supports kernel compilation which allows adding drivers, patches or new features that are not included in the original kernel.Allows customization of the source package using Debian Tools.It allows to compile kernels for RISC architecture from distributions for amd64 and i386.When Kali Linux was created in its beginning it was developed only for linux software, however, as time passed, these packages or tools that Kali contains were extended to other operating systems to be able to be used. Aircack-ng is a software for security testing in wireless networks.Some of the programs that are pre-installed are: Kali is distributed in complicated ISO images for different architectures (32 / 64bits and ARM). It contains a pre-installation of more than 600 programs. Kali Linux is developed under a secure environment, the development team is the only one that can modify packages and interact with the repositories. In Linux you will find in distros with varied options to produce music, view files, multimedia or write documents are some of the tools that I can mention in terms of the applications that we can find in Kali Linux. Starting with the software applications that are needed to perform the computer audits, pen testing or Instructional Ests such as Zenmap, Namao, Oswap, Zap, Armitage, Aircrack-ng etc. One of the advantages of GNU/Linux to your system is that it allows an adaptation to get the necessary and specific tools for the tasks we want to carry out. Kali offer you an operating system with the opportunity to protect it against possible hacker attacks, and in this area there are more than 300 applications, which are responsible for ensuring the security of your computer through Kali Linux, among many that exist I can mention Nmap that controls network access ports. Based on their domain and ability to perform an audit on networks and systems, they obtain the solution and can destroy possible vulnerabilities to these criminals such as hackers. Although it can be countered using ethical hackers, they are dedicated to fighting illegal hacking activities. Remember that the Backtrack programming was fixed on Ubuntu while this distribution is based on Debian.Īlthough there is a great danger with this distro, because its perfect mechanism and audits are all hosted on the internet, hackers study which are the weakest points of a network, having this knowledge could start an attack on other systems and networks that are connected to the internet. It is to make available to the user, the best tools and capacity to be able to work the audit on the internet and thus control the computer security system before any danger that it may present. ![]() ![]() It is important to keep computer security under control on your computer in terms of the operating system. Thus, you can have a good protection system on your computer. For this reason I announce version 5 R3, this being the latest version of Backtrack and for the next version 6 it is called Kali, being a Linux distribution which allows us to audit the system and ensure that our computer equipment can access the internet without risk in that may suffer some damage from hacking. Now, Kali Linux is an improved version of Backtrack, it is a Linux distribution derived from Debian and a member of the OS UNIX family being financed by Offensive Security designed mainly for penetration testing and digital forensics, I was aware that each new version of Backtrack was getting slower, heavier, and actually hardly ever used by users, taking away the chance to win the best distribution for IT security professionals. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |