Cyber Security Hand Book
X
  • Introduction
    • 💡About Me
  • Malware and Code
    • 👨‍💻Malware
      • Malware creation
        • 💉Process Injection
        • DLL Injection
        • 📝PEB & TEB
      • Analysis
        • 🛠️Tools
        • Threads and Process
        • Alternate Data Streams
        • Digital Signatures
  • WIFI Hacking
    • WIFI Hacking
      • 3 Way Hand Shake
      • WIFI basics
      • WIFI Pinaple
      • ALFA Network cards
  • Binary
    • Binary
  • Pentesting
    • Pentesting
  • Open Source Licences
  • Gates and Circuits
  • Disk Scheduling
  • Linux
    • Getting Started with Linux
      • History
      • Comands
        • File Golbbling
        • Variables
      • Installed programs
        • 🐄Metasploit
        • 🐈‍⬛Netcat
      • Kernel
        • Bootloader
      • Permissions
  • Networking
    • Network fundamentals
    • 🚪IDOR'S
  • Powershell
    • Powershell basics
      • Windows Services
      • Windows Properties
      • Sam Files
  • Digital Forensics
    • Intro
      • Mobile Imaging
Powered by GitBook
On this page
  1. Linux
  2. Getting Started with Linux

Installed programs

Kali Linux is a Debian-based distribution specifically designed for digital forensics and penetration testing. It comes pre-installed with a comprehensive collection of security tools and software for various information security tasks, including:

  • Penetration Testing Tools: Applications like Metasploit, Nmap, and Burp Suite help users identify and exploit vulnerabilities.

  • Forensic Tools: Software such as Autopsy and Sleuth Kit facilitate detailed forensic investigations.

  • Reverse Engineering: Tools like Ghidra and radare2 assist in analyzing binaries and understanding how programs work.

  • Wireless Attacks: Utilities such as Aircrack-ng and Reaver are included for testing wireless network security.

  • Web Vulnerability Assessment Tools: Tools like OWASP ZAP and sqlmap are available for testing and identifying web vulnerabilities.

Offensive Security maintains Kali Linux and receives regular updates to ensure users can access the latest tools and software.

PreviousVariablesNextMetasploit

Last updated 5 months ago