-
Notifications
You must be signed in to change notification settings - Fork 3
Expand file tree
/
Copy pathdocs-page.html
More file actions
645 lines (558 loc) · 50.4 KB
/
docs-page.html
File metadata and controls
645 lines (558 loc) · 50.4 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
<!DOCTYPE html>
<html lang="en">
<head>
<title>needlinux-Kali-linux</title>
<!-- Meta -->
<meta charset="utf-8">
<meta http-equiv="X-UA-Compatible" content="IE=edge">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta name="description" content="Bootstrap 4">
<meta name="author" content="naem azam at 3rd Wave Media">
<link rel="shortcut icon" href="favicon.ico">
<!-- Google Font -->
<link href="https://fonts.googleapis.com/css?family=Poppins:300,400,500,600,700&display=swap" rel="stylesheet">
<!-- FontAwesome JS-->
<script defer src="assets/fontawesome/js/all.min.js"></script>
<!-- Plugins CSS -->
<link rel="stylesheet" href="//cdnjs.cloudflare.com/ajax/libs/highlight.js/9.15.2/styles/atom-one-dark.min.css">
<!-- Theme CSS -->
<link id="theme-style" rel="stylesheet" href="assets/css/theme.css">
</head>
<body class="docs-page">
<header class="header fixed-top">
<div class="branding docs-branding">
<div class="container-fluid position-relative py-2">
<div class="docs-logo-wrapper">
<button id="docs-sidebar-toggler" class="docs-sidebar-toggler docs-sidebar-visible mr-2 d-xl-none" type="button">
<span></span>
<span></span>
<span></span>
</button>
<div class="site-logo"><a class="navbar-brand" href="index.html"><img class="logo-icon mr-2" src="assets/images/needlinux.png" alt="logo"><span class="logo-text">Need<span class="text-alt">Linux</span></span></a></div>
</div><!--//docs-logo-wrapper-->
<div class="docs-top-utilities d-flex justify-content-end align-items-center">
<div class="top-search-box d-none d-lg-flex">
<form class="search-form">
<input type="text" placeholder="Search the docs..." name="search" class="form-control search-input">
<button type="submit" class="btn search-btn" value="Search"><i class="fas fa-search"></i></button>
</form>
</div>
<ul class="social-list list-inline mx-md-3 mx-lg-5 mb-0 d-none d-lg-flex">
<li class="list-inline-item"><a href="https://github.com/need-linux/kali-linux"><i class="fab fa-github fa-fw"></i></a></li>
<li class="list-inline-item"><a href="#"><i class="fab fa-linux fa-fw"></i></a></li>
<li class="list-inline-item"><a href="#"><i class="fab fa-ubuntu fa-fw"></i></a></li>
<a href="https://need-linux.github.io/learning/menu.html" class="btn btn-primary d-none d-lg-flex">Live Practice </a>
</ul><!--//social-list-->
<a href="https://need-linux.github.io/learning/menu.html" class="btn btn-primary d-none d-lg-flex">Menu</a>
</div><!--//docs-top-utilities-->
</div><!--//container-->
</div><!--//branding-->
</header><!--//header-->
<div class="docs-wrapper">
<div id="docs-sidebar" class="docs-sidebar">
<div class="top-search-box d-lg-none p-3">
<form class="search-form">
<input type="text" placeholder="Search the docs..." name="search" class="form-control search-input">
<button type="submit" class="btn search-btn" value="Search"><i class="fas fa-search"></i></button>
</form>
</div>
<nav id="docs-nav" class="docs-nav navbar">
<ul class="section-items list-unstyled nav flex-column pb-3">
<li class="nav-item section-title"><a class="nav-link scrollto active" href="#section-1"><span class="theme-icon-holder mr-2"><i class="fab fa-linux"></i></span>Introduction</a></li>
<li class="nav-item"><a class="nav-link scrollto" href="#item-1-1">What is Kali Linux?</a></li>
<li class="nav-item"><a class="nav-link scrollto" href="#item-1-2">Kali Linux Features</a></li>
<li class="nav-item"><a class="nav-link scrollto" href="#item-1-3">Should I Use Kali Linux?</a></li>
<li class="nav-item"><a class="nav-link scrollto" href="#item-1-4">Which Image Should I Download?</a></li>
<li class="nav-item"><a class="nav-link scrollto" href="#item-1-5">Desktop Environment and (Meta)Packages</a></li>
<li class="nav-item"><a class="nav-link scrollto" href="#item-1-6">Video Tutorial and Practice</a></li>
<li class="nav-item section-title mt-3"><a class="nav-link scrollto" href="#section-2"><span class="theme-icon-holder mr-2"><i class="fas fa-arrow-down"></i></span>Installation</a></li>
<li class="nav-item"><a class="nav-link scrollto" href="#item-2-1">Intel-based PCs</a></li>
<li class="nav-item"><a class="nav-link scrollto" href="#item-2-2">Virtual Machines</a></li>
<li class="nav-item"><a class="nav-link scrollto" href="#item-2-3">ARM Images</a></li>
<li class="nav-item section-title mt-3"><a class="nav-link scrollto" href="#section-3"><span class="theme-icon-holder mr-2"><i class="fas fa-cogs"></i></span>Basic Commands</a></li>
<li class="nav-item"><a class="nav-link scrollto" href="#item-3-1">Learn Basic Commands</a></li>
<li class="nav-item"><a class="nav-link scrollto" href="#item-3-2">Kali-linux Commands</a></li>
<li class="nav-item"><a class="nav-link scrollto" href="#item-3-3">Section Item 3.3</a></li>
<li class="nav-item section-title mt-3"><a class="nav-link scrollto" href="#section-4"><span class="theme-icon-holder mr-2"><i class="fas fa-terminal"></i></span>Top Used Tools</a></li>
<li class="nav-item"><a class="nav-link scrollto" href="#item-4-1">Information gathering </a></li>
<li class="nav-item"><a class="nav-link scrollto" href="#item-4-2">Vulnerability Analyses Tools</a></li>
<li class="nav-item"><a class="nav-link scrollto" href="#item-4-3">Wireless Tools</a></li>
<li class="nav-item"><a class="nav-link scrollto" href="#item-4-4">Website Penetration</a></li>
<li class="nav-item"><a class="nav-link scrollto" href="#item-4-5">Exploitation</a></li>
<li class="nav-item"><a class="nav-link scrollto" href="#item-4-6">Forensics</a></li>
<li class="nav-item"><a class="nav-link scrollto" href="#item-4-7">Social Engineering</a></li>
<li class="nav-item"><a class="nav-link scrollto" href="#item-4-8">Section Item 4.3</a></li>
<li class="nav-item"><a class="nav-link scrollto" href="#item-4-9">Section Item 4.3</a></li>
<li class="nav-item section-title mt-3"><a class="nav-link scrollto" href="#section-5"><span class="theme-icon-holder mr-2"><i class="fas fa-tools"></i></span>Trobleshooting</a></li>
<li class="nav-item"><a class="nav-link scrollto" href="#item-5-1">The Basics of Troubleshooting</a></li>
<li class="nav-item"><a class="nav-link scrollto" href="#item-5-2">Installations Failures</a></li>
<li class="nav-item"><a class="nav-link scrollto" href="#item-5-3">Section Item 5.3</a></li>
<li class="nav-item section-title mt-3"><a class="nav-link scrollto" href="#section-6"><span class="theme-icon-holder mr-2"><i class="fas fa-laptop-code"></i></span>Devlopment</a></li>
<li class="nav-item"><a class="nav-link scrollto" href="#item-6-1">Basic Knows </a></li>
<li class="nav-item"><a class="nav-link scrollto" href="#item-6-2">Section Item 6.2</a></li>
<li class="nav-item section-title mt-3"><a class="nav-link scrollto" href="#section-7"><span class="theme-icon-holder mr-2"><i class="fas fa-tablet-alt"></i></span>Top Uses</a></li>
<li class="nav-item"><a class="nav-link scrollto" href="#item-7-1">Penetration test</a></li>
<li class="nav-item"><a class="nav-link scrollto" href="#item-7-2">Bug bounty</a></li>
<li class="nav-item"><a class="nav-link scrollto" href="#item-7-3">Section Item 7.3</a></li>
<li class="nav-item section-title mt-3"><a class="nav-link scrollto" href="#section-8"><span class="theme-icon-holder mr-2"><i class="fas fa-book-reader"></i></span>Resources</a></li>
<li class="nav-item"><a class="nav-link scrollto" href="#item-8-1">Books</a></li>
<li class="nav-item"><a class="nav-link scrollto" href="#item-8-2">Websites</a></li>
<li class="nav-item"><a class="nav-link scrollto" href="#item-8-3">Discuss Kali Linux</a></li>
<li class="nav-item section-title mt-3"><a class="nav-link scrollto" href="#section-9"><span class="theme-icon-holder mr-2"><i class="fas fa-lightbulb"></i></span>FAQs</a></li>
<li class="nav-item"><a class="nav-link scrollto" href="#item-9-1">Section Item 9.1</a></li>
<li class="nav-item"><a class="nav-link scrollto" href="#item-9-2">Section Item 9.2</a></li>
<li class="nav-item"><a class="nav-link scrollto" href="#item-9-3">Section Item 9.3</a></li>
</ul>
</nav><!--//docs-nav-->
</div><!--//docs-sidebar-->
<div class="docs-content">
<div class="container">
<article class="docs-article" id="section-1">
<header class="docs-header">
<h1 class="docs-heading">Introduction <span class="docs-time">Last updated: 2022-06-01</span></h1>
<p>Linux is a community of open-source Unix like operating systems that are based on the Linux Kernel. It is a free and open-source operating system and the source code can be modified and distributed to anyone commercially or noncommercially under the GNU General Public License</p>
<img class="logo-icon mr-2" src="assets/images/kali-desktop-xfce.jpg"> </img>
<section class="docs-section" id="item-1-1">
<h2 class="section-heading">What is Kali Linux?</h2>
<p>Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. It is maintained and funded by Offensive Security.</p>
<p>Kali Linux (formerly known as BackTrack Linux) is an open-source, Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. Kali Linux contains several hundred tools targeted towards various information security tasks, such as Penetration Testing, Security Research, Computer Forensics and Reverse Engineering. Kali Linux is a multi platform solution, accessible and freely available to information security professionals and hobbyists.
Kali Linux was released on the 13th March 2013 as a complete, top-to-bottom rebuild of BackTrack Linux, adhering completely to Debian development standards.</p>
</section><!--//section-->
<section class="docs-section" id="item-1-2">
<h2 class="section-heading">Kali Linux Features</h2>
<p>More than 600 penetration testing tools included: After reviewing every tool that was included in BackTrack, we eliminated a great number of tools that either simply did not work or which duplicated other tools that provided the same or similar functionality. Details on what’s included are on the Kali Tools site. </p>
<p>Free (as in beer) and always will be: Kali Linux, like BackTrack, is completely free of charge and always will be. You will never, ever have to pay for Kali Linux. </p>
<p>Open source Git tree: We are committed to the open source development model and our development tree is available for all to see. All of the source code which goes into Kali Linux is available for anyone who wants to tweak or rebuild packages to suit their specific needs. </p>
<p>Custom kernel, patched for injection: As penetration testers, the development team often needs to do wireless assessments, so our kernel has the latest injection patches included. </p>
<p>Multi-language support: Although penetration tools tend to be written in English, we have ensured that Kali includes true multilingual support, allowing more users to operate in their native language and locate the tools they need for the job. </p>
</section><!--//section-->
<section class="docs-section" id="item-1-3">
<h2 class="section-heading">Should I Use Kali Linux?</h2>
<p>As the distribution’s developers, you might expect us to recommend that everyone should be using Kali Linux. The fact of the matter is, however, that Kali is a Linux distribution specifically geared towards professional penetration testers and security specialists, and given its unique nature, it is NOT a recommended distribution if you’re unfamiliar with Linux or are looking for a general-purpose Linux desktop distribution for development, web design, gaming, etc.
Even for experienced Linux users, Kali can pose some challenges. Although Kali is an open source project, it’s not a wide-open source project, for reasons of security. The development team is small and trusted, packages in the repositories are signed both by the individual committer and the team, and - importantly - the set of upstream repositories from which updates and new packages are drawn is very small. Adding repositories to your software sources which have not been tested by the Kali Linux development team is a good way to cause problems on your system.
While Kali Linux is architected to be highly customizable, do not expect to be able to add random unrelated packages and repositories that are “out of band” of the regular Kali software sources and have it Just Work. In particular, there is absolutely no support whatsoever for the apt-add-repository command, LaunchPad, or PPAs. Trying to install Steam on your Kali Linux desktop is an experiment that will not end well. Even getting a package as mainstream as NodeJS onto a Kali Linux installation can take a little extra effort and tinkering.
If you are unfamiliar with Linux generally, if you do not have at least a basic level of competence in administering a system, if you are looking for a Linux distribution to use as a learning tool to get to know your way around Linux, or if you want a distro that you can use as a general purpose desktop installation, Kali Linux is probably not what you are looking for.
In addition, misuse of security and penetration testing tools within a network, particularly without specific authorization, may cause irreparable damage and result in significant consequences, personal and/or legal. “Not understanding what you were doing” is not going to work as an excuse.
However, if you’re a professional penetration tester or are studying penetration testing with a goal of becoming a certified professional, there’s no better toolkit - at any price - than Kali Linux.</p>
</section>
<section class="docs-section" id="item-1-4">
<h2 class="section-heading">Which Image Should I Download?</h2>
<p>The Kali Linux download page offers three different image types (Installer, NetInstaller and Live) for download, each available for both 32-bit and 64-bit architectures.
If in doubt, use the “Installer” image. You will need to check your system architecture to know whether to get 32-bit or 64-bit. If you don’t know it, you’re best to research how to find out (As a rule of thumb, if your machine’s newer than 2005 you should be okay with amd64/x64/64-bit)</p>
<p> Installer </p>
<p> This is the recommended image to install Kali Linux. It contains a local copy of the (meta)packages listed (top10, default & large) so it can be used for complete offline installations without the need of a network connection.
This image cannot be used to boot a live system (such as directly running Kali from a USB). It is only an installer image. </p>
<p> NetInstaller</p>
<p>This image can be used if you want the latest package every time you install Kali Linux or the standard installer image is too big to download. This image is very small because it does not contain a local copy of (meta)packages to install. They will all be downloaded during installation, so as a result this requires a network connection which will slow down the installation time.
Only use this image if you have reasons not to use the standard installer image above.
This image cannot be used to boot a live system (such as directly running Kali from a USB). It is only an installer image. </p>
<p>Live </p>
<p>This image is for running Kali Linux without installing it first so it is perfect for running off a USB drive (or a CD/DVD).
You are able to install Kali Linux in its default configuration from this image but you will not be able to choose between desktop environments or to specify additional (meta)packages to install. </p>
</section>
<section class="docs-section" id="item-1-5">
<h2 class="section-heading">Which Desktop Environment and (Meta)Packages to Choose During Installation:</h2>
<p> Each Kali Linux installer image (not live) allows the user to select the preferred “Desktop Environment (DE)” and software collection (metapackages) to be installed with operating system (Kali Linux).
We recommend sticking with the default selections and add further packages after the installation as required. Xfce is the default desktop environment, and kali-linux-top10 and kali-linux-default are the tools which get installed at the same time.</p>
</section>
<section class="docs-section" id="item-1-6">
<h2 class="section-heading">Video Tutorial and Practice </h2>
<p> watch kali linux online tutorial free on youtube </p>
<li><a href="#" class="btn btn-info"><i class="fas fa-play-circle mr-2"></i> Watch Video</a></li>
</section>
<!--//section-->
</article>
<article class="docs-article" id="section-2">
<header class="docs-header">
<h1 class="docs-heading">Installation</h1>
<section class="docs-intro">
<p> IMPORTANT! Never download Kali Linux images from anywhere other than the official sources.
Always be sure to verify the SHA256 checksums of the file you’ve downloaded against our official values.
It would be easy for a malicious entity to modify a Kali installation to contain exploits or malware and host it unofficially. </p>
<div class="table-responsive my-4">
<table class="table table-striped">
<thead>
<tr>
<th scope="col"><a href="https://www.kali.org/get-kali/#kali-platforms" class="btn btn-primary"><i class="fas fa-download mr-2"></i> Download Now</a></th>
<th scope="col"><a href="#" class="btn btn-secondary"><i class="fas fa-book mr-2"></i> Read PDF Full Guide</a></th>
<th scope="col"><a href="#" class="btn btn-info"><i class="fas fa-play-circle mr-2"></i> Watch Video</a></th>
</tr>
</thead></table>
</div>
</section><!--//docs-intro-->
</header>
<section class="docs-section" id="item-2-1">
<h2 class="section-heading">ISO Files for Intel-based PCs</h2>
<p> In order to run Kali “Live” from a USB drive on standard Windows and Apple PCs, you’ll need a Kali Linux bootable ISO image, in either 32-bit or 64-bit format. </p>
<p> If you’re not sure of the architecture of the system you want to run Kali on, on Linux or macOS, you can run the command uname -m at the command line. If you get the response, “x86_64”, use the 64-bit ISO image (the one containing “amd64” in the file name); if you get “i386”, use the 32-bit image (the one containing “i386” in the file name). If you’re on a Windows system, the procedure for determining whether your architecture is detailed on Microsoft’s website.</p>
<p>The Kali Linux images are available both as directly downloadable “.iso/.img” files or via “.torrent” files. </p>
<p> Official Kali ISOs for Intel-based PCs</p>
<li><a href="#" class="btn btn-info"><i class="fas fa-play-circle mr-2"></i> Watch Video</a></li>
</section><!--//section-->
<section class="docs-section" id="item-2-2">
<h2 class="section-heading">Virtual Machines Images</h2>
<p> If you want to run Kali Linux as a “guest” under VMware or VirtualBox, Kali Linux is available as a pre-built virtual machines with any guest tools already installed. These image are available in a 64-bit (amd64), and 32-bit PAE (i*86) formats.</p>
<li><a href="#" class="btn btn-info"><i class="fas fa-play-circle mr-2"></i> Watch Video</a></li>
<p> </p>
</section><!--//section-->
<section class="docs-section" id="item-2-3">
<h2 class="section-heading">ARM Images</h2>
<p>The hardware architectures of ARM-based devices vary considerably, so it is not possible to have a single image that will work across all of them. Pre-built Kali Linux images for the ARM architecture are available for a wide range of devices. </p>
<p>The hardware architectures of ARM-based devices vary considerably, so it is not possible to have a single image that will work across all of them. Pre-built Kali Linux images for the ARM architecture are available for a wide range of devices. </p>
<li><a href="#" class="btn btn-info"><i class="fas fa-play-circle mr-2"></i> Watch Video</a></li>
</section><!--//section-->
</article><!--//docs-article-->
<article class="docs-article" id="section-3">
<header class="docs-header">
<h1 class="docs-heading">Basic Commands</h1>
<section class="docs-intro">
<p> Welcome to this new experience I’m sure you will enjoy once you start playing with your terminal … Kali Linux commands are nothing special from Linux commands they are the same so what you are going to learn here will work in every Linux system you may use, try over and over we are learning at the end and this is the most important part of it,
Commands are almost everything in Linux so you must learn at least the basic commands we are not in Windows to click we are in Linux to type!
so here is a list for some of the basic commands for Kali Linux </p>
</section><!--//docs-intro-->
</header>
<section class="docs-section" id="item-3-1">
<h2 class="section-heading">Learn Basic Commands </h2>
<p>When operating a Linux OS, you need to use a shell — an interface that gives you access to the operating system’s services. Most Linux distributions use a graphic user interface (GUI) as their shell, mainly to provide ease of use for their users. </p>
<div class="table-responsive my-4">
<table class="table table-striped">
<thead>
<tr>
<th scope="col"><a href="#" class="btn btn-primary"><i class="fas fa-download mr-2"></i> View Linux Basic Commands </a></th>
<th scope="col"><a href="#" class="btn btn-secondary"><i class="fas fa-book mr-2"></i> Read PDF Full Guide</a></th>
<th scope="col"><a href="#" class="btn btn-info"><i class="fas fa-play-circle mr-2"></i> Watch Video</a></th>
</tr>
</thead></table>
</div>
</section><!--//section-->
<section class="docs-section" id="item-3-2">
<h2 class="section-heading">Kali-linux Commands</h2>
<p> Kali Linux commands are nothing special from Linux commands they are the same so what you are going to learn here will work in every Linux system you may use, try over and over we are learning at the end and this is the most important part of it, </p>
<div class="table-responsive my-4">
<table class="table table-striped">
<thead>
<tr>
<th scope="col"><a href="#" class="btn btn-primary"><i class="fas fa-download mr-2"></i> Download Kali-linux Commands Cheatcheet </a></th>
<th scope="col"><a href="#" class="btn btn-info"><i class="fas fa-play-circle mr-2"></i> Watch Video</a></th>
</tr>
</thead></table>
</div>
</section><!--//section-->
</article><!--//docs-article-->
<article class="docs-article" id="section-4">
<header class="docs-header">
<h1 class="docs-heading">Top Used Tools </h1>
<section class="docs-intro">
<p>Sometimes we have to automate our tasks while performing penetration testing or hacking as there could be thousands of conditions and payloads to test and testing them manually is a difficult task, So to increase the time efficiency we use tools that come pre-packed with Kali Linux. These tools not only saves our time but also captures the accurate data and output the specific result. Kali Linux comes packed with more than 350 tools which could be useful for hacking or penetration testing. Here we have the list of important Kali Linux tools that could save a lot of your time and effort. </p>
</section><!--//docs-intro-->
</header>
<section class="docs-section" id="item-4-1">
<h2 class="section-heading">Information gathering Tool </h2>
<img class="logo-icon mr-2" src="assets/images/nmap_zenmap.jpg"> </img>
<p>Information Gathering is the act of gathering different kinds of information against the targeted victim or system. ... There are various tools, techniques, and websites, including public sources such as Whois, nslookup that can help hackers gather information. </p>
<h3> Top Used Tools </h3>
<li>Nmap Tool</a></li>
<li>ZenMAP</a></li>
<li>whois lookup</a></li>
<li>SPARTA</a></li>
<div class="table-responsive my-4">
<table class="table table-striped">
<thead>
<tr>
<th scope="col"><a href="#" class="btn btn-primary"><i class="fas fa-download mr-2"></i> Download Nmap Guide</a></th>
<th scope="col"><a href="#" class="btn btn-info"><i class="fas fa-play-circle mr-2"></i> Watch Video</a></th>
</tr>
</thead></table>
</div>
</section><!--//section-->
<section class="docs-section" id="item-4-2">
<h2 class="section-heading">Vulnerability Analyses Tools</h2>
<p>Vulnerability assessment tools are designed to automatically scan for new and existing threats that can target your application. Types of tools include: Web application scanners that test for and simulate known attack patterns. Protocol scanners that search for vulnerable protocols, ports and network services. </p>
<h3> Top Used Tools </h3>
<li>cisco Tools</a></li>
<li>ManageEngine</a></li>
<li>Acunetix</a></li>
<li>Probely.</a></li>
<div class="table-responsive my-4">
<table class="table table-striped">
<thead>
<tr>
<th scope="col"><a href="#" class="btn btn-primary"><i class="fas fa-download mr-2"></i> Download Cisco Guide</a></th>
<th scope="col"><a href="#" class="btn btn-info"><i class="fas fa-play-circle mr-2"></i> Watch Video</a></th>
</tr>
</thead></table>
</div>
</section>
<section class="docs-section" id="item-4-3">
<h2 class="section-heading">Wireless Tools</h2>
<img class="logo-icon mr-2" src="assets/images/fern_wireless_cracker.jpg"> </img>
<br/>
<p> A wireless attack is a malicious action against wireless system information or wireless networks; examples can be denial of service attacks, penetration, and sabotage.</p>
<div class="table-responsive my-4">
<table class="table table-striped">
<thead>
<tr>
<th scope="col"><a href="#" class="btn btn-primary"><i class="fas fa-download mr-2"></i> Download Fern Guide Guide</a></th>
<th scope="col"><a href="#" class="btn btn-info"><i class="fas fa-play-circle mr-2"></i> Watch Video</a></th>
</tr>
</thead></table>
</div>
</section>
<section class="docs-section" id="item-4-4">
<h2 class="section-heading">Website Penetration</h2>
<img class="logo-icon mr-2" src="assets/images/vega.jpg"> </img>
<p>Web application penetration testing is the process of using penetration testing techniques on a web application to detect its vulnerabilities. It is similar to a penetration test and aims to break into the web application using any penetration attacks or threats. </p>
<div class="table-responsive my-4">
<table class="table table-striped">
<thead>
<tr>
<th scope="col"><a href="#" class="btn btn-primary"><i class="fas fa-download mr-2"></i> Download Vaga Guide</a></th>
<th scope="col"><a href="#" class="btn btn-info"><i class="fas fa-play-circle mr-2"></i> Watch Video</a></th>
</tr>
</thead></table>
</div>
</section>
<section class="docs-section" id="item-4-5">
<h2 class="section-heading">Exploitation</h2>
<img class="logo-icon mr-2" src="assets/images/exploitation_tools.jpg"> </img>
</br>
<p>An exploit is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic. </p>
<div class="table-responsive my-4">
<table class="table table-striped">
<thead>
<tr>
<th scope="col"><a href="#" class="btn btn-primary"><i class="fas fa-download mr-2"></i> Download Metasploit Guide</a></th>
<th scope="col"><a href="#" class="btn btn-info"><i class="fas fa-play-circle mr-2"></i> Watch Video</a></th>
</tr>
</thead></table>
</div>
</section>
<section class="docs-section" id="item-4-6">
<h2 class="section-heading">Forensics</h2>
<p> Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. ... The terms digital forensics and cyber forensics are often used as synonyms for computer forensics.</p>
<div class="table-responsive my-4">
<table class="table table-striped">
<thead>
<tr>
<th scope="col"><a href="#" class="btn btn-primary"><i class="fas fa-download mr-2"></i> Download p0f Guide</a></th>
<th scope="col"><a href="#" class="btn btn-info"><i class="fas fa-play-circle mr-2"></i> Watch Video</a></th>
</tr>
</thead></table>
</div>
</section>
<section class="docs-section" id="item-4-7">
<h2 class="section-heading">Social Engineering</h2>
<img class="logo-icon mr-2" src="assets/images/social_engineering_tools.jpg"> </img>
<p>social engineering is the psychological manipulation of people into performing actions or divulging confidential information. This differs from social engineering within the social sciences, which does not concern the divulging of confidential information.
</p>
<div class="table-responsive my-4">
<table class="table table-striped">
<thead>
<tr>
<th scope="col"><a href="#" class="btn btn-primary"><i class="fas fa-download mr-2"></i> Download p0f Guide</a></th>
<th scope="col"><a href="#" class="btn btn-info"><i class="fas fa-play-circle mr-2"></i> Watch Video</a></th>
</tr>
</thead></table>
</div>
</section><!--//section-->
<section class="docs-section" id="item-4-3">
<h2 class="section-heading">Section Item 4.3</h2>
</section><!--//section-->
</article><!--//docs-article-->
<article class="docs-article" id="section-5">
<header class="docs-header">
<h1 class="docs-heading">Trobleshooting</h1>
<section class="docs-intro">
<p> Having trouble installing Kali Linux? Passwords don't work? VT-x or AMD-v issues? Root not working? </p>
</section><!--//docs-intro-->
</header>
<section class="docs-section" id="item-5-1">
<h2 class="section-heading">The Basics of Troubleshooting</h2>
<p> Troubleshooting Linux can be very confusing due to all of the moving parts. This doc will aim to cover as much as possible while still being understandable. If you believe something is missing or could be improved, please submit an issue to help to try and get this to be as complete as possible.</p>
<h2> Log files</h2>
<li> /var/log/ - Contains most log files might be needed to troubleshoot an issue</li>
<li> /var/log/syslog - Contains messages from the kernel and other programs and services</li>
<li> /var/log/auth.log - Contains system authorization events</li>
<li> /var/log/Xorg.0.log - Contains log messages from X</li>
<li> /var/log/kern.log - Contains kernel messages only</li>
<li> ~/.xsession-errors - Contains errors that occur within the Linux graphical environment from the X window session</li>
<p> Different programs may have log files in their own locations as well. Checking the man pages (man package) will likely provide the information needed to either find the file or find a different location that will contain the information you need.</p>
<h2>Commands and processes </h2>
<p> Anything mentioned should have their man page looked at for more details. Additionally, if there is an issue with a graphical tool that does not display an error try running it through the command line.</p>
<li>journalctl - Will show the contents of the systemd journal </li>
<li>dmesg - Will show kernel events, allows to see errors </li>
<li>ip - Network configuration </li>
<li>service - runs a System V init script or upstart job </li>
<li>df - See how much disk space is free, which may prevent certain things </li>
<li> top - See lots of information about the computer, can help to pinpoint CPU, memory, etc issues</li>
<li> dpkg - Allows for troubleshooting of packages (along with normal functionality)</li>
<li> apt - Also allows for troubleshooting of packages (along with normal functionality)</li>
<li> ps and kill - Combo to find a process that may be causing problems and kill it</li>
<li>tail (-f specifically) - lets you watch log files be written to in real time </li>
<li> systemctl - Used to control the systemd system and service manager</li>
</section><!--//section-->
<section class="docs-section" id="item-5-2">
<h2 class="section-heading">Installations Failures</h2>
<p>There can be a wide variety of reasons for a Kali Linux installation to fail. This could include issues such as a corrupt or incomplete ISO download, not enough disk space on the target machine, etc. The following article will give you some pointers on what to look for when your Kali Linux installation has failed. The following is an example of the dreaded “Red Screen”, indicating the installation encountered a problem. </p>
<!-- image -->
<img class="logo-icon mr-2" src="assets/images/1.png"> </img>
<p> Hitting the continue button should take you to the Debian installer main menu. From that main menu, browse to the “save debug logs": </p>
<!-- image -->
<img class="logo-icon mr-2" src="assets/images/2.png"> </img>
<p> Going into the debug logs, you are presented with several ways of transferring the installation log files away from the failed installation. The most convenient way is usually to start a web server on the machine undergoing the installation. </p>
<!-- image -->
<img class="logo-icon mr-2" src="assets/images/3.png"> </img>
<p> Once you choose this option, a web server is started from which you are able to download or view several installation log files.</p>
<!-- image -->
<img class="logo-icon mr-2" src="assets/images/4.png"> </img>
<p>Look over the logs files for anything irregular, or any error messages which look like they might be the cause of your failed installation. In this case, the target machine did not have enough disk space to install Kali Linux, as was seen towards the end of the syslinux log file </p>
</section><!--//section-->
<section class="docs-section" id="item-5-3">
<h2 class="section-heading">Section Item 5.3</h2>
<p>Vivamus efficitur fringilla ullamcorper. Cras condimentum condimentum mauris, vitae facilisis leo. Aliquam sagittis purus nisi, at commodo augue convallis id. Sed interdum turpis quis felis bibendum imperdiet. Mauris pellentesque urna eu leo gravida iaculis. In fringilla odio in felis ultricies porttitor. Donec at purus libero. Vestibulum libero orci, commodo nec arcu sit amet, commodo sollicitudin est. Vestibulum ultricies malesuada tempor.</p>
</section><!--//section-->
</article><!--//docs-article-->
<article class="docs-article" id="section-6">
<header class="docs-header">
<h1 class="docs-heading">Devlopment</h1>
<section class="docs-intro">
<p> So one could easily rephrase your question and leave “Kali”completely out - - “Can I use LINUX for developing…” And the answer is, of course you can.</p>
</section><!--//docs-intro-->
</header>
<section class="docs-section" id="item-6-1">
<h2 class="section-heading">Some Basic Knows Before Devlopment</h2>
<p>I don't know where you are on your programming journey or which language(s) you are interested in but many computer science departments are quickly learning what the community has known for a while, that Python is a fantastic language for beginners and power users alike. Your basic Python tools are already installed on any Linux. </p>
<p>But if you really just want to learn programming, then for the sake of security, please do it on a more generic Linux. My personal preference is to run Xubuntu but that could be anything. Then install Kali as a virtual machine inside that using either VirtualBox or, my preference, virt-manager with QEMU. </p>
<p>The Xubuntu (or whatever) is where you set up your development environment and you only start the Kali instance when you want to explore the penetration testing tools. It's a fairly elegant solution, I think. The reason for this is because you don't want the penetration testing tools just laying around for a potential bad guy (or girl) to leverage against you. </p>
<p> For even better security and portability, you could even set up your development environment in a second virtual machine running on top of the base OS. Best of wishes.</p>
</section><!--//section-->
<section class="docs-section" id="item-6-2">
<h2 class="section-heading">Section Item 6.2</h2>
<p>Vivamus efficitur fringilla ullamcorper. Cras condimentum condimentum mauris, vitae facilisis leo. Aliquam sagittis purus nisi, at commodo augue convallis id. Sed interdum turpis quis felis bibendum imperdiet. Mauris pellentesque urna eu leo gravida iaculis. In fringilla odio in felis ultricies porttitor. Donec at purus libero. Vestibulum libero orci, commodo nec arcu sit amet, commodo sollicitudin est. Vestibulum ultricies malesuada tempor.</p>
</section><!--//section-->
</article><!--//docs-article-->
<article class="docs-article" id="section-7">
<header class="docs-header">
<h1 class="docs-heading">Top Uses</h1>
<section class="docs-intro">
<p>Section intro goes here. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Quisque finibus condimentum nisl id vulputate. Praesent aliquet varius eros interdum suscipit. Donec eu purus sed nibh convallis bibendum quis vitae turpis. Duis vestibulum diam lorem, vitae dapibus nibh facilisis a. Fusce in malesuada odio.</p>
</section><!--//docs-intro-->
</header>
<section class="docs-section" id="item-7-1">
<h2 class="section-heading">Penetration test</h2>
<p>A penetration test, colloquially known as a pen test, pentest or ethical hacking, is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system; this is not to be confused with a vulnerability assessment. </p>
</section><!--//section-->
<section class="docs-section" id="item-7-2">
<h2 class="section-heading">Bug bounty</h2>
<p>A bug bounty program is a deal offered by many websites, organizations and software developers by which individuals can receive recognition and compensation for reporting bugs, especially those pertaining to security exploits and vulnerabilities. </p>
</section><!--//section-->
<section class="docs-section" id="item-7-3">
<h2 class="section-heading">Section Item 7.3</h2>
<p>Vivamus efficitur fringilla ullamcorper. Cras condimentum condimentum mauris, vitae facilisis leo. Aliquam sagittis purus nisi, at commodo augue convallis id. Sed interdum turpis quis felis bibendum imperdiet. Mauris pellentesque urna eu leo gravida iaculis. In fringilla odio in felis ultricies porttitor. Donec at purus libero. Vestibulum libero orci, commodo nec arcu sit amet, commodo sollicitudin est. Vestibulum ultricies malesuada tempor.</p>
</section><!--//section-->
</article><!--//docs-article-->
<article class="docs-article" id="section-8">
<header class="docs-header">
<h1 class="docs-heading">Resources</h1>
<section class="docs-intro">
<p> The following resources contain additional information on Kali Linux. Please use them to get more in-depth knowledge on this.</p>
</section><!--//docs-intro-->
</header>
<section class="docs-section" id="item-8-1">
<h2 class="section-heading">Books </h2>
<p>Vivamus efficitur fringilla ullamcorper. Cras condimentum condimentum mauris, vitae facilisis leo. Aliquam sagittis purus nisi, at commodo augue convallis id. Sed interdum turpis quis felis bibendum imperdiet. Mauris pellentesque urna eu leo gravida iaculis. In fringilla odio in felis ultricies porttitor. Donec at purus libero. Vestibulum libero orci, commodo nec arcu sit amet, commodo sollicitudin est. Vestibulum ultricies malesuada tempor.</p>
<div class="table-responsive my-4">
<table class="table table-striped">
<thead>
<tr>
<th scope="col"><a href="https://www.kali.org/get-kali/#kali-platforms" class="btn btn-primary"><i class="fas fa-download mr-2"></i> Download Now</a></th>
<th scope="col"><a href="#" class="btn btn-secondary"><i class="fas fa-book mr-2"></i> Read PDF Full Guide</a></th>
<th scope="col"><a href="#" class="btn btn-info"><i class="fas fa-play-circle mr-2"></i> Watch Video</a></th>
</tr>
</thead>
<thead>
<tr>
<th scope="col"><a href="https://www.kali.org/get-kali/#kali-platforms" class="btn btn-primary"><i class="fas fa-download mr-2"></i> Download Now</a></th>
<th scope="col"><a href="#" class="btn btn-secondary"><i class="fas fa-book mr-2"></i> Read PDF Full Guide</a></th>
<th scope="col"><a href="#" class="btn btn-info"><i class="fas fa-play-circle mr-2"></i> Watch Video</a></th>
</tr>
</thead>
</table>
</div>
</section><!--//section-->
<section class="docs-section" id="item-8-2">
<h2 class="section-heading">WeBsites</h2>
<p>Vivamus efficitur fringilla ullamcorper. Cras condimentum condimentum mauris, vitae facilisis leo. Aliquam sagittis purus nisi, at commodo augue convallis id. Sed interdum turpis quis felis bibendum imperdiet. Mauris pellentesque urna eu leo gravida iaculis. In fringilla odio in felis ultricies porttitor. Donec at purus libero. Vestibulum libero orci, commodo nec arcu sit amet, commodo sollicitudin est. Vestibulum ultricies malesuada tempor.</p>
</section><!--//section-->
<section class="docs-section" id="item-8-3">
<h2 class="section-heading">Discuss Kali Linux</h2>
<p>Kali Linux is one of the best open-source security packages of an ethical hacker, containing a set of tools divided by categories. Kali Linux can be installed in a machine as an Operating System, which is discussed in this tutorial. Installing Kali Linux is a practical option as it provides more options to work and combine the tools. This tutorial gives a complete understanding on Kali Linux and explains how to use it in practice.</p>
</section><!--//section-->
</article><!--//docs-article-->
<article class="docs-article" id="section-9">
<header class="docs-header">
<h1 class="docs-heading">FAQs</h1>
<section class="docs-intro">
<p>Section intro goes here. You can list all your FAQs using the format below.</p>
</section><!--//docs-intro-->
</header>
<section class="docs-section" id="item-9-1">
<h2 class="section-heading">Section Item 9.1 <small>(FAQ Category One)</small></h2>
<h5 class="pt-3"><i class="fas fa-question-circle mr-1"></i>What's sit amet quam eget lacinia?</h5>
<p>Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aenean commodo ligula eget dolor. Aenean massa. Cum sociis natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Donec quam felis, ultricies nec, pellentesque eu, pretium quis, sem. Nulla consequat massa quis enim. Donec pede justo, fringilla vel, aliquet nec, vulputate eget, arcu. In enim justo, rhoncus ut, imperdiet a, venenatis vitae, justo. Nullam dictum felis eu pede mollis pretium.</p>
<h5 class="pt-3"><i class="fas fa-question-circle mr-1"></i>How to ipsum dolor sit amet quam tortor?</h5>
<p>Donec sodales sagittis magna. Sed consequat, leo eget bibendum sodales, augue velit cursus nunc, quis gravida magna mi a libero. Fusce vulputate eleifend sapien. Vestibulum purus quam, scelerisque ut, mollis sed, nonummy id, metus. Nullam accumsan lorem in dui. </p>
<h5 class="pt-3"><i class="fas fa-question-circle mr-1"></i>Can I bibendum sodales?</h5>
<p>Fusce vulputate eleifend sapien. Vestibulum purus quam, scelerisque ut, mollis sed, nonummy id, metus. Nullam accumsan lorem in dui. </p>
<h5 class="pt-3"><i class="fas fa-question-circle mr-1"></i>Where arcu sed urna gravida?</h5>
<p>Aenean et sodales nisi, vel efficitur sapien. Quisque molestie diam libero, et elementum diam mollis ac. In dignissim aliquam est eget ullamcorper. Sed id sodales tortor, eu finibus leo. Vivamus dapibus sollicitudin justo vel fermentum. Curabitur nec arcu sed urna gravida lobortis. Donec lectus est, imperdiet eu viverra viverra, ultricies nec urna. </p>
</section><!--//section-->
<section class="docs-section" id="item-9-2">
<h2 class="section-heading">Section Item 9.2 <small>(FAQ Category Two)</small></h2>
<h5 class="pt-3"><i class="fas fa-question-circle mr-1"></i>What's sit amet quam eget lacinia?</h5>
<p>Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aenean commodo ligula eget dolor. Aenean massa. Cum sociis natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Donec quam felis, ultricies nec, pellentesque eu, pretium quis, sem. Nulla consequat massa quis enim. Donec pede justo, fringilla vel, aliquet nec, vulputate eget, arcu. In enim justo, rhoncus ut, imperdiet a, venenatis vitae, justo. Nullam dictum felis eu pede mollis pretium.</p>
<h5 class="pt-3"><i class="fas fa-question-circle mr-1"></i>How to ipsum dolor sit amet quam tortor?</h5>
<p>Donec sodales sagittis magna. Sed consequat, leo eget bibendum sodales, augue velit cursus nunc, quis gravida magna mi a libero. Fusce vulputate eleifend sapien. Vestibulum purus quam, scelerisque ut, mollis sed, nonummy id, metus. Nullam accumsan lorem in dui. </p>
<h5 class="pt-3"><i class="fas fa-question-circle mr-1"></i>Can I bibendum sodales?</h5>
<p>Fusce vulputate eleifend sapien. Vestibulum purus quam, scelerisque ut, mollis sed, nonummy id, metus. Nullam accumsan lorem in dui. </p>
<h5 class="pt-3"><i class="fas fa-question-circle mr-1"></i>Where arcu sed urna gravida?</h5>
<p>Aenean et sodales nisi, vel efficitur sapien. Quisque molestie diam libero, et elementum diam mollis ac. In dignissim aliquam est eget ullamcorper. Sed id sodales tortor, eu finibus leo. Vivamus dapibus sollicitudin justo vel fermentum. Curabitur nec arcu sed urna gravida lobortis. Donec lectus est, imperdiet eu viverra viverra, ultricies nec urna. </p>
</section><!--//section-->
<section class="docs-section" id="item-9-3">
<h2 class="section-heading">Section Item 9.3 <small>(FAQ Category Three)</small></h2>
<h5 class="pt-3"><i class="fas fa-question-circle mr-1"></i>How to dapibus sollicitudin justo vel fermentum?</h5>
<p>Donec sodales sagittis magna. Sed consequat, leo eget bibendum sodales, augue velit cursus nunc, quis gravida magna mi a libero. Fusce vulputate eleifend sapien. Vestibulum purus quam, scelerisque ut, mollis sed, nonummy id, metus. Nullam accumsan lorem in dui. </p>
<h5 class="pt-3"><i class="fas fa-question-circle mr-1"></i>How long bibendum sodales?</h5>
<p>Fusce vulputate eleifend sapien. Vestibulum purus quam, scelerisque ut, mollis sed, nonummy id, metus. Nullam accumsan lorem in dui. </p>
<h5 class="pt-3"><i class="fas fa-question-circle mr-1"></i>Where dapibus sollicitudin?</h5>
<p>Aenean et sodales nisi, vel efficitur sapien. Quisque molestie diam libero, et elementum diam mollis ac. In dignissim aliquam est eget ullamcorper. Sed id sodales tortor, eu finibus leo. Vivamus dapibus sollicitudin justo vel fermentum. Curabitur nec arcu sed urna gravida lobortis. Donec lectus est, imperdiet eu viverra viverra, ultricies nec urna. </p>
</section><!--//section-->
</article><!--//docs-article-->
<footer class="footer">
<div class="container text-center py-5">
<small class="copyright">Designed with <i class="fas fa-heart" style="color: #fb866a;"></i> by <a class="theme-link" href="http://naemazam.github.io" target="_blank">Naem Azam</a> for developers</small>
<ul class="social-list list-unstyled pt-4 mb-0">
<li class="list-inline-item"><a href="#"><i class="fab fa-github fa-fw"></i></a></li>
<li class="list-inline-item"><a href="#"><i class="fab fa-twitter fa-fw"></i></a></li>
<li class="list-inline-item"><a href="#"><i class="fab fa-slack fa-fw"></i></a></li>
<li class="list-inline-item"><a href="#"><i class="fab fa-product-hunt fa-fw"></i></a></li>
<li class="list-inline-item"><a href="#"><i class="fab fa-facebook-f fa-fw"></i></a></li>
<li class="list-inline-item"><a href="#"><i class="fab fa-instagram fa-fw"></i></a></li>
</ul><!--//social-list-->
</div>
</footer>
</div>
</div>
</div><!--//docs-wrapper-->
<!-- Javascript -->
<script src="assets/plugins/jquery-3.4.1.min.js"></script>
<script src="assets/plugins/popper.min.js"></script>
<script src="assets/plugins/bootstrap/js/bootstrap.min.js"></script>
<!-- Page Specific JS -->
<script src="https://cdnjs.cloudflare.com/ajax/libs/highlight.js/9.15.8/highlight.min.js"></script>
<script src="assets/js/highlight-custom.js"></script>
<script src="assets/plugins/jquery.scrollTo.min.js"></script>
<script src="assets/plugins/lightbox/dist/ekko-lightbox.min.js"></script>
<script src="assets/js/docs.js"></script>
</body>
</html>