#Thread
Kali Linux Sections Explained

Information Gathering

These are Reconnaissance tools used to gather data on your target network and devices. Tools range from identifying devices to
protocols used.

(1/n)
#KaliLinux #CyberSecurity #Hacking
Vulnerability Analysis

Tools from this section focus on evaluating systems for vulnerabilities. Typically, these are run against systems found using the
Information Gathering Reconnaissance tools.

(2/n)
Web Applications

These are tools used to audit and exploit vulnerabilities in web servers. Many of the audit tools we will refer to in this book come
directly from this category.

(3a/n)
However web applications do not always refer to attacks against web servers, they can simply be web-based tools for networking services. For example, web proxies will be found under
this section.

(3b/n)
Password Attacks

This section of tools primarily deals with brute force or the offline computation of passwords or shared keys used for authentication.
(4/n)
Wireless Attacks
These are tools used to exploit vulnerabilities found in
wireless protocols. 802.11 tools will be found here, including tools such as aircrack, airmon, and wireless password cracking tools. In addition, this section has tools related to RFID and Bluetooth
(5a/n)
vulnerabilities as well. In many cases, the tools in this section will need to be used with a wireless adapter that can be configured by Kali to be put in promiscuous mode.
(5b/n)
Exploitation Tools

These are tools used to exploit vulnerabilities found in systems. Usually, a vulnerability is identified during a Vulnerability Assessment of a target.
(6/n)
Sniffing and Spoofing

These are tools used for network packet captures, network packet manipulators, packet crafting applications, and web spoofing. There are also a few VoIP reconstruction applications.
(7/n)
Maintaining Access

Maintaining Access tools are used once a foothold is established into a target system or network. It is common to find compromised systems having multiple hooks back to the attacker to

(8a/n)
provide alternative routes in the event a vulnerability that is used by the attacker is found and remediated.

(8b/n)
Reverse Engineering

These tools are used to disable executable and debug programs. The purpose of reverse engineering is to analyze how a program was developed so it can be copied, modified, or lead to the development of other programs.

(9a/n)
Reverse Engineering is also used for malware analysis to determine what an executable does or by researchers to attempt to find vulnerabilities in software applications.

(9b/n)
Stress Testing
Stress Testing tools are used to evaluate how much data a system can handle. Undesired outcomes could be obtained from overloading systems such as causing a device controlling network communication to open all communication channels or a system shutting down
(10/n)
Hardware Hacking

This section contains Android tools, which could be classified as mobile, and Ardunio tools that are used for programming and controlling other small electronic devices.
(11/n)
Forensics

Forensics tools are used to monitor and analyze computer network traffic and applications.
(12/n)
Reporting Tools

Reporting tools are methods to deliver information found during a penetration exercise.
(13/n)
System Services

This is where you can enable and disable Kali services.
Services are grouped into BeEF, Dradis, HTTP, Metasploit, MySQL, and SSH

END
Source: Kali Linux Pentesting Ebook
@UnrollHelper unroll please

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Cypher (Ciphar 1337)

Cypher (Ciphar 1337) Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @ciphar_TheViper

Jul 23, 2020
#PTMExposed ...! (Thread)
So we finally uncovering the social media cells of so called parties.. we have honey trapped one of social media handle responsible for trending hashtags,viral videos, anti state ,anti government content .
Worked on him from Month ..
#PTMBehindTerrorism
To gain his trust .he is from #PTM_QUETTA International relations student working with various political parties including #PTM ,#PPP #PMLN and some #PTI Minsters . He claims takes 100s of thousands of from them to make #Propaganda I also got his number from one of
High political person also paid him just 10,000 due to that references. as I'm attaching Screenshots below you can see how they work (sorry for hiding all info due to involvement of high profile political people to get him)
Read 13 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(