Skip to main content

Posts

Hacking with Security Tools Part - 5

  Kali Linux Comparison with Other security distributions Introduction    Welcome to the last module of this workshop. We have been talking about hacking & exploit development so far in this workshop. Over the Internet, there are many distributions which you can see as security distributions which were build for penetration testing or security testing as a main purpose. But not all of them have the strength that Kali Linux has.   In this module, we will simply present the comparison or the intros of other security related operating systems and Kali Linux.   Known Hacking Distributions (Operating Systems)   1 – Blackbuntu      Blackbuntu is a penetration testing Linux distribution that is specially designed for training security students and information security practitioners. It was built on Ubuntu 10.10 with the Gnome desktop environment. Blackbuntu will also include the KDE desktop in the final release of Blackbuntu Commu...

Hacking with Security Tools Part - 4

  Top 10 Security Tools in Kali Linux Introduction  Welcome to module 4 of this workshop. So far, you have learned about hacking with Kali Linux and a taste of how you can utilize Kali Linux as a base platform for exploit development. Here we will highlight the top 10 security tools available in Kali Linux and their purpose.   Prerequisites  It is recommended that you should first complete the previous three modules before you start reading this module.   Top Ten Security Tools available in Kali Linux   Use the application tab and expand the top ten security tools as shown in below figure. You can see the list of tools in the most right tab open under the category top 10 security tools. We will expand each tool one by one.   The first tool, which is presented under top ten categories, is air-crack.     From the vendor’s mouth “Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packe...

Hacking with Security Tools Part - 3

  Kali Linux and Exploit Development Introduction    Welcome to the exploit development module. So far, we have been talking about the ethical hacking aspects of Kali Linux. You can also use this wonderful security distribution in the exploit development. Kali Linux comes with pre-installed tools and accessories, which gives support in the exploit development lifecycle. In this module, we will not be explaining “what is exploit development” but we will be discussing where Kali Linux can be used in the exploit development.  Prerequisites  • Basic concepts of exploits  • Prior knowledge about debugging  • Programming concepts  • TCP/IP understanding  • Understanding the background of exploit development   Kali Linux Exploit Development Support   Covering the real aspects of exploit development lifecycle, Kali Linux basically is not a full fleshed exploit development platform, however, it has pre-installed tools that hav...

Hacking with Security Tools Part - 2

  Kali Linux and Ethical Hacking Introduction   Welcome to the second module of this workshop. In the previous module we presented how you can setup a virtual environment on which you can practice ethical hacking skills. Now we will move to the steps where we can further put light on the practical stuff. Let’s explore how you can practice ethical hacking with Kali Linux. Prerequisite     It is recommended that you first create a live virtual environment as explained in Module 1 and with a minimum of the following machines running in the virtual ethical hacking lab.  • Master Box (Kali Linux)   • Windows XP   • Metasploit   • Any other OS as recommended in Module 1 . Knowledge Base    Let’s first talk about a bit on the explanatory bit, which you can memorize before stepping into real hacking.   What is Ethical Hacking?    You must have heard enough on hacking! But what is ethical hacking? ...

Hacking with Security Tools Part - I

 Setting up your Virtual Environment     Welcome to the first module of this workshop where we will present lots of hacking tricks and techniques you can achieve with Kali Linux. In fact, you can perform complete end-to-end hacking with Kali Linux. When thinking about hacking you might think that it’s a difficult job, but with Kali, this job will be much easier and all the instructions will be presented in this workshop. Prerequisites  Surprisingly, you don’t need to have any solid background in a security or hacking field, we will present all the skills that can make you a hacker!       However, you need to have a solid playground where you can perform hacking on a trial basis and for this reason you need to have a solid machine on which you can build your hacking environment. In this module, we will be guiding you on how you can make your own lab to practice hacking.  Building the Virtual Hacking Environment  To achieve this goal, you ...