, Kali Linux
About the Tutorial
Kali Linux is one of the best open-source security packages of an ethical hacker, containing
a set of tools divided by categories. Kali Linux can be installed in a machine as an Operating
System, which is discussed in this tutorial. Installing Kali Linux is a practical option as it
provides more options to work and combine the tools.
This tutorial gives a complete understanding on Kali Linux and explains how to use it in
practice.
Audience
This tutorial has been prepared for beginners to help them understand the fundamentals
of Kali Linux. It will specifically be useful for penetration testing professionals. After
completing this tutorial, you will find yourself at a moderate level of expertise from where
you can take yourself to the next levels.
Prerequisites
Although this tutorial will benefit most of the beginners, it will definitely be a plus if you
are familiar with the basic concepts of any Linux operating system.
Copyright & Disclaimer
Copyright 2018 by Tutorials Point (I) Pvt. Ltd.
All the content and graphics published in this e-book are the property of Tutorials Point (I)
Pvt. Ltd. The user of this e-book is prohibited to reuse, retain, copy, distribute or republish
any contents or a part of contents of this e-book in any manner without written consent
of the publisher.
We strive to update the contents of our website and tutorials as timely and as precisely as
possible, however, the contents may contain inaccuracies or errors. Tutorials Point (I) Pvt.
Ltd. provides no guarantee regarding the accuracy, timeliness or completeness of our
website or its contents including this tutorial. If you discover any errors on our website or
in this tutorial, please notify us at
i
, Kali Linux
Table of Contents
About the Tutorial .................................................................................................................................. i
Audience ................................................................................................................................................ i
Prerequisites .......................................................................................................................................... i
Copyright & Disclaimer ........................................................................................................................... i
Table of Contents .................................................................................................................................. ii
1. KALI LINUX – INSTALLATION & CONFIGURATION ............................................................... 1
Download and Install the Virtual Box .................................................................................................... 1
Install Kali Linux..................................................................................................................................... 6
Update Kali ............................................................................................................................................ 8
Laboratory Setup ................................................................................................................................. 10
2. KALI LINUX ─ INFORMATION GATHERING TOOLS ............................................................. 14
NMAP and ZenMAP ............................................................................................................................. 14
Stealth Scan ......................................................................................................................................... 16
Searchsploit ......................................................................................................................................... 18
DNS Tools ............................................................................................................................................ 19
LBD Tools ............................................................................................................................................. 21
Hping3 ................................................................................................................................................. 21
3. KALI LINUX ─ VULNERABILITY ANALYSES TOOLS ............................................................... 23
Cisco Tools ........................................................................................................................................... 23
Cisco Auditing Tool .............................................................................................................................. 24
Cisco Global Exploiter .......................................................................................................................... 25
BED ...................................................................................................................................................... 26
ii
About the Tutorial
Kali Linux is one of the best open-source security packages of an ethical hacker, containing
a set of tools divided by categories. Kali Linux can be installed in a machine as an Operating
System, which is discussed in this tutorial. Installing Kali Linux is a practical option as it
provides more options to work and combine the tools.
This tutorial gives a complete understanding on Kali Linux and explains how to use it in
practice.
Audience
This tutorial has been prepared for beginners to help them understand the fundamentals
of Kali Linux. It will specifically be useful for penetration testing professionals. After
completing this tutorial, you will find yourself at a moderate level of expertise from where
you can take yourself to the next levels.
Prerequisites
Although this tutorial will benefit most of the beginners, it will definitely be a plus if you
are familiar with the basic concepts of any Linux operating system.
Copyright & Disclaimer
Copyright 2018 by Tutorials Point (I) Pvt. Ltd.
All the content and graphics published in this e-book are the property of Tutorials Point (I)
Pvt. Ltd. The user of this e-book is prohibited to reuse, retain, copy, distribute or republish
any contents or a part of contents of this e-book in any manner without written consent
of the publisher.
We strive to update the contents of our website and tutorials as timely and as precisely as
possible, however, the contents may contain inaccuracies or errors. Tutorials Point (I) Pvt.
Ltd. provides no guarantee regarding the accuracy, timeliness or completeness of our
website or its contents including this tutorial. If you discover any errors on our website or
in this tutorial, please notify us at
i
, Kali Linux
Table of Contents
About the Tutorial .................................................................................................................................. i
Audience ................................................................................................................................................ i
Prerequisites .......................................................................................................................................... i
Copyright & Disclaimer ........................................................................................................................... i
Table of Contents .................................................................................................................................. ii
1. KALI LINUX – INSTALLATION & CONFIGURATION ............................................................... 1
Download and Install the Virtual Box .................................................................................................... 1
Install Kali Linux..................................................................................................................................... 6
Update Kali ............................................................................................................................................ 8
Laboratory Setup ................................................................................................................................. 10
2. KALI LINUX ─ INFORMATION GATHERING TOOLS ............................................................. 14
NMAP and ZenMAP ............................................................................................................................. 14
Stealth Scan ......................................................................................................................................... 16
Searchsploit ......................................................................................................................................... 18
DNS Tools ............................................................................................................................................ 19
LBD Tools ............................................................................................................................................. 21
Hping3 ................................................................................................................................................. 21
3. KALI LINUX ─ VULNERABILITY ANALYSES TOOLS ............................................................... 23
Cisco Tools ........................................................................................................................................... 23
Cisco Auditing Tool .............................................................................................................................. 24
Cisco Global Exploiter .......................................................................................................................... 25
BED ...................................................................................................................................................... 26
ii