Top 25 Best Kali Linux Tools for Beginners (Source)
Total Page:16
File Type:pdf, Size:1020Kb
Kali Linux For Beginners Glen Maxson Center for Learning in Retirement Spring 2019 What is Kali Linux • Kali Linux, (first released on the 13th March, 2013) which was formally known as BackTrack, developed by the security firm Offensive Security, is a forensic and security-focused distribution based on Debian’s Testing branch. Kali Linux is designed with penetration testing, data recovery and threat detection in mind. • Kali Linux is free, and has 600+ penetration testing tools included. But first a caution and some advice • Kali Linux isn’t recommended for beginners. Period. This is the first thing you should learn. It is a Linux Distribution geared towards Security Professionals. • During penetration testing, it is crucial to prepare to stay anonymous. Don’t fool yourself by revealing your own identity while hacking, cover it! Kali Install Modes - Basic Differences (source) 1. Live Mode - boots using the USB drive so we run Kali from USB instead of running our main system. This allows us to inspect the system without worrying about locked/running processes. Live mode does not save changes. If you run reports, generate logs or save any data then it will be wiped when you reboot. Changes are not saved. 2. Live Mode (failsafe) - same as above but a bit more robust in case the system fails. Nicer to your devices. 3. Live Mode (forensic) - nothing loads, runs or happens unless it is initiated by you. USB devices do not auto mount and the internal hard drive is not touched. Nothing happens until you make it happen. Very good for professional forensic work. 4. Live USB Persistence - exactly the same as Live Mode but changes will save. Great for generating reports, logs, dumps and saving data. 5. Live USB Encrypted Persistence - same as above but with encryption. Good for professional uses. 6. Install - install Kali Linux as your main system 7. Graphical Install - graphical version of the above Video 8. Install With Speech Synthesis - speech instructions included 9. Advanced Options - includes MemTest and Hardware Detection Tool And a note about Adding Persistence to a Kali Linux “Live” USB Drive Things To Do After Installing Kali Linux (source) Top Things to do after Installing Kali Linux (source) Video (23 min.) Top Things to do after Installing Kali Linux (source) Video Top Things to do after Installing Kali Linux (source) Video Top Things to do after Installing Kali Linux (source) Video Top Things to do after Installing Kali Linux (source) Video Top Things to do after Installing Kali Linux (source) Video Top Things to do after Installing Kali Linux (source) Video Top Things to do after Installing Kali Linux (source) Video Top Things to do after Installing Kali Linux (source) Video Top Things to do after Installing Kali Linux (source) Video Top Things to do after Installing Kali Linux (source) Video Top Things to do after Installing Kali Linux (source) Video Top Things to do after Installing Kali Linux (source) Video Top Things to do after Installing Kali Linux (source) To login you type: nordvpn login To connect you type: nordvpn connect This connects you to NordVPN. To show settings and modify them type: nordvpn settings Video Top 25 Best Kali Linux Tools For Beginners (source) ANONYMITY 25. MacChanger Top 25 Best Kali Linux Tools For Beginners (source) ANONYMITY 24. ProxyChains Top 25 Best Kali Linux Tools For Beginners (source) INFORMATION GATHERING 23. TraceRoute Top 25 Best Kali Linux Tools For Beginners (source) INFORMATION GATHERING 22.WhatWeb Top 25 Best Kali Linux Tools For Beginners (source) INFORMATION GATHERING 21. Whois Top 25 Best Kali Linux Tools For Beginners (source) INFORMATION GATHERING 20. Maltegoce (Maltego Community Edition) Maltegoce is an intelligence gathering tool which aims to discover and collect data about the target (company or personal) and visualizes that collected data into graph for analysis. Before we are using maltegoce, first register an maltego community edition here: https://www.paterva.com/web7/community/community.php Top 25 Best Kali Linux Tools For Beginners (source) INFORMATION GATHERING 20. Maltegoce (Maltego Community Edition) Top 25 Best Kali Linux Tools For Beginners (source) INFORMATION GATHERING 20. Maltegoce (Maltego Community Edition) Top 25 Best Kali Linux Tools For Beginners (source) INFORMATION GATHERING 20. Maltegoce (Maltego Community Edition) Top 25 Best Kali Linux Tools For Beginners (source) INFORMATION GATHERING 20. Maltegoce (Maltego Community Edition) Top 25 Best Kali Linux Tools For Beginners (source) INFORMATION GATHERING 19. NMAP Network Mapper (NMap) is a tool used for network discovery and security auditing. My favorite option in NMAP is “–script vuln” it tells NMAP to audit the security of each open port on target using NSE. For example: ~$ nmap kali.org --script vuln To view full list of NMAP features, see the help page instead. ~$ nmap --help Top 25 Best Kali Linux Tools For Beginners (source) INFORMATION GATHERING 18. Dirbuster / Dirb Top 25 Best Kali Linux Tools For Beginners (source) VULNERABILITY ANALYSIS 17. Nikto Top 25 Best Kali Linux Tools For Beginners (source) WEB APPLICATION ANALYSIS 16. SQLiv Top 25 Best Kali Linux Tools For Beginners (source) WEB APPLICATION ANALYSIS 15. BurpSuite Top 25 Best Kali Linux Tools For Beginners (source) WEB APPLICATION ANALYSIS 14. OWASP-ZAP Top 25 Best Kali Linux Tools For Beginners (source) WEB APPLICATION ANALYSIS • 13. HTTRACK Httrack is a website / webpage cloner, from a penetration testing perspective, it is mainly used to create a fake website, or phising in attacker server. Run httrack wizard by typing in the terminal : ~$ httrack You will be prompted, some configuration needed with guidance. Such as, Project name, Base path of the project, set the URL target and the proxy configuration. Top 25 Best Kali Linux Tools For Beginners (source) WEB APPLICATION ANALYSIS 12. JoomScan & WPScan JoomScan is a Web application analysis tool to scan and analyze Joomla CMS, while WPScan is a WordPress CMS vulnerability scanner. To check what CMS is installed on a target website, you can use either ONLINE CMS Scanner, or using additional tools, “CMSMap”. (https://github.com/Dionach/CMSmap). Once you know the target CMS, whether it is Joomla or WordPress, then you can decide to use JoomsScan or WPScan. Run JoomScan: ~$ joomscan -u victim.com Run WPScan: ~$ wpscan -u victim.com Top 25 Best Kali Linux Tools For Beginners (source) DATABASE ASSESSMENT 11. SQLMap Top 25 Best Kali Linux Tools For Beginners (source) DATABASE ASSESSMENT 11. SQLMap Top 25 Best Kali Linux Tools For Beginners (source) PASSWORD ATTACKS 10. Hash-Identifier and findmyhash Hash-identifier is a tool to identify the different types of hashes used to encrypt data and especially passwords. Findmyhash is a tool to crack encrypted passwords or data using online services. For example we got encrypted data: 098f6bcd4621d373cade4e8326 27b4f6. First thing you are going to need to do is identify the hash type. To do that, launch “hash-identifier” in terminal, and input the hash value on it. Top 25 Best Kali Linux Tools For Beginners (source) PASSWORD ATTACKS 10. Hash-Identifier and findmyhash Top 25 Best Kali Linux Tools For Beginners (source) PASSWORD ATTACKS 9. Crunch Top 25 Best Kali Linux Tools For Beginners (source) PASSWORD ATTACKS 8. John The Ripper (OFFLINE PASSWORD CRACKING SERVICE) John The Ripper is one of the most popular password testing and cracking programs as it combines a number of password crackers into one package, auto-detects password hash types, and includes a customization cracker. In Linux, “passwd” file located at /etc/passwd contains all user information. hash SHA encrypted password of each of the users found is stored in /etc/shadow file. Top 25 Best Kali Linux Tools For Beginners (source) PASSWORD ATTACKS 7. THC Hydra (ONLINE PASSWORD CRACKING SERVICE) • Hydra is the fastest network login cracker which supports numerous attack protocols. THC Hydra supports these protocols: Cisco AAA, Cisco auth, Cisco enable, CVS, FTP, HTTP(S)-FORM-GET, HTTP(S)-FORM-POST, HTTP(S)-GET, HTTP(S)-HEAD, HTTP-Proxy, ICQ, IMAP, IRC, LDAP, MS-SQL, MySQL, NNTP, Oracle Listener, Oracle SID, PC-Anywhere, PC-NFS, POP3, PostgreSQL, RDP, Rexec, Rlogin, Rsh, SIP, SMB(NT), SMTP, SMTP Enum, SNMP v1+v2+v3, SOCKS5, SSH (v1 and v2), SSHKEY, Subversion, Teamspeak (TS2), Telnet, VMware-Auth, VNC and XMPP. • For more depth and detail tutorial about hydra visit my previous article titled Crack Web Based Login Page With Hydra in Kali Linux (https://linuxhint.com/crack-web-based-login-page-with-hydra-in-kali-linux/) Top 25 Best Kali Linux Tools For Beginners (source) WIRELESS ATTACK 6. Aircrack-NG Suite Top 25 Best Kali Linux Tools For Beginners (source) WIRELESS ATTACK 5. Fluxion Evil twin is a term for a rogue Wi-Fi access point that appears to be a legitimate one offered on the premises, but actually has been set up to eavesdrop on wireless communications. An evil twin is the wireless version of the phishing scam. Top 25 Best Kali Linux Tools For Beginners (source) EXPLOITATION TOOLS 4. Social Engineering Toolkit (SET) The Social-Engineer Toolkit is an open-source penetration testing framework designed for Social- Engineering. SET has a number of custom attack vectors such as phishing, spear-phishing, malicious USB, mass mail, etc. This toolkit is a free product by Trustedsec.com. To start using SET, type in terminal “seetolkit”. Top 25 Best Kali Linux Tools For Beginners (source) EXPLOITATION TOOLS 3. METASPLOIT FRAMEWORK • Metasploit Framework initially was intended to be a maintainable framework which automates the process of exploiting rather than manually verifying it. Metasploit is a popular framework through history, it has rich modules aimed at a variety of targets such as Unix, BSD, Apple, Windows, Android, WebServers, etc. Below, is an example usage of metasploit, exploiting Windows OS using popular NSA Exploit EternalBlue and DoublePulsar.