We’re gonna be going through a quick summary on Kali Linux Debian direct Linux distribution and explaining very very superficially how it works and what it can bring to the table now Kali Linux as mentioned before is a Debian derived linen 6 tribution design mainly for penetration testing but also has available some tools for digital forensics back a tracking.
Sniffing hijacking I’m gonna be mentioning.
Like some sort of a list later on on a.
Few of these penetration testing programs and some of the applications that the system provides for you to practice or perform these penetration testing it is a distribution that cannot run by itself for it is a user space and not a foundational part.
Of system this means that you will have to run Kali Linux in an already existent environment or a pre-existing aperto system preferably UNIX or UNIX divert a UNIX derived you can also run it in virtual machines and it is highly.
Recommended considering that virtual machines change your MAC address or not change it but rather camouflage it and when you’re performing attacks or when you’re practicing with the system or and the tools provided by it you will be finding yourself performing.
Illegal activities obviously when you’re doing ethical hacking and when you’re doing it to yourself there’s nothing wrong with it you’re basically your own victim but still it is safe to run in virtual machines because sometimes when you’re performing some of these attacks you leave your computer open we talk.
About performance we’re specifically referring to its previous version which would be backtrack this system trades speed for simplistic file directory handling as every other user space a repair system.
It provides an alpha user in this system it’s called route these user has the ability to venture through every possible directory in the system however these.
Through a standard procedure hierarchy.
I’m talking on how an individual computer sorts data specifically where its dorset and how it keeps up on where it is we talk about this specific hierarchy most of these directories are accessed or controlled through command line on a terminal if you’re working on a command line these are called.
Directories the typical computer science classes.
These are simply called file folders or.
Folders simply these work on a higher key as mentioned before meaning that some have control over others.
Depending on which level of directory we’re talking about these directories provided in the picture our examples of standard directories provided by Kali Linux without any alterations beginning their hierarchy in a system from top to bottom you declare the highest level the command being the root directory through the root you gain access to these files Ben for example means binary it’s where most of the programs live when we go to boot it’s where the bootloaders allocated our dev stands for all the devices in the computer et Cie which is one of the most.
Important folders holds the configuration files typically change their worked with when performing automatic pen tests.
And home which is basically the desktop just a part of your printer system it’s obviously a separated one but it works the same.