• Home
  • Become a Hacker
    • Get Started
    • Hacker Mindset
    • Roadmap
    • Simple Setup – Hacker 101
    • Types of Hackers
    • Recommended Courses
  • Boot People Offline
  • Courses
    • All Hacking Courses
    • Cyber Security School
  • CTF
    • Beginners to Advanced Guide
    • Create your own CTF box
    • Field and Resources Guide
    • Platforms & Wargames
    • Tools Used for Solving CTF
    • Writeups
  • Dark Web
    • Beginners Guide
    • Darknet Markets
    • Darkweb 101 (Anonymity Guide)
    • Dark Web OSINT Tools
    • Hacking Forums
    • Latest News
    • Onion Links
  • Hacker Gadgets
  • Hacking Books
  • Tools Directory
Menu
  • Home
  • Become a Hacker
    • Get Started
    • Hacker Mindset
    • Roadmap
    • Simple Setup – Hacker 101
    • Types of Hackers
    • Recommended Courses
  • Boot People Offline
  • Courses
    • All Hacking Courses
    • Cyber Security School
  • CTF
    • Beginners to Advanced Guide
    • Create your own CTF box
    • Field and Resources Guide
    • Platforms & Wargames
    • Tools Used for Solving CTF
    • Writeups
  • Dark Web
    • Beginners Guide
    • Darknet Markets
    • Darkweb 101 (Anonymity Guide)
    • Dark Web OSINT Tools
    • Hacking Forums
    • Latest News
    • Onion Links
  • Hacker Gadgets
  • Hacking Books
  • Tools Directory
Search
Close
  • Home
  • 2015
  • June
  • 24
  • Review of Kali Linux – The Successor of backtrack

Review of Kali Linux – The Successor of backtrack

June 24, 2015November 18, 2017 Comments Off on Review of Kali Linux – The Successor of backtrack

Kali Linux is a penetration testing and security auditing Linux distribution. After its release in March
2013, Kali Linux has quickly become the new favorite among PenTesters worldwide as their choice
for the PenTesting OS. Replacing its predecessor Backtrack, Kali incorporated several new
features and looks quite promising.

It is available for i386 and amd64 architectures and has the
same Minimum Hardware Requirements as Backtrack: 1 GHz CPU, 8 GB of Hard Disk Space, 300
MB RAM, And DVD-writer/Ability to boot with a Pen drive.

You can download Kali-Linux from their official site here:https://www.kali.org/downloads/

A Little History

To be very concise, Kali is an offshoot of Backtrack, which is an Offshoot of ‘Whax’, which is itself
an Offshoot of ‘Whoppix’, which is derived from ‘Knoppix’. Something common among all of these
distros is that they were focused on Digital Forensics and Intrusion Detection, with Backtrack and
Kali adding a whole lot of Tools for PenTesting purposes. Backtrack has been “giving machine
guns to monkeys since 2007”, so it has had a long reign as the favorite distro of PenTesters
worldwide. ‘Offensive-Security’, the creators of Backtrack, decided to incorporate many changes in
new Backtrack 6 (as it was called at that time). Since it was built from scratch, it was significantly
different from the older versions of Backtrack and Offensive-Security decided to give a new name
to the Distro – ‘Kali Linux’.

What was wrong with Backtrack and why it needed a change?

We all love Backtrack but bottom-line is that there are a lot of problems associated with this distro.
The most annoying problem is ‘updating’. There was always a fear of ‘breaking’ something if you
updated it. There were too many tools and some of them weren’t updated as frequently as the
others. So updating the ‘dependencies’ of some would cause others to crash and we struggled to
maintain a balance where all these tools and their dependencies would co-exist without getting in
each other’s way.
When we wanted to use a tool, we needed to type the absolute path in shell.
For example, /pentest/passwords/john/john “file_name”
Remembering the locations of the tools was a pain and it just made things complicated.
In addition, Backtrack had a lot of ‘puny’ errors which crept up here and there while we were
working, small issues that we had to resolve on our own or run to Backtrack forums and get help
from other Pentesters there.
For example, the ‘wicd d-bus error’ that was ready to greet us when we installed a fresh copy of
BT5 and tried to connect to a network. Backtrack forums (and other websites) are filled with ‘how-to
posts’ that attempt to provide solution to such problems. Eventually we learned to get around these
issues but it did waste a lot of our time.

What makes Kali different from Backtrack 5?

This is the most asked question about Kali today. Offensive Security has tried to answer it on their
website “Unfortunately for us, that’s not a simple question to answer. It’s a mix between ‘everything’
and ‘not much’, depending on how you used Backtrack.”

Switch From Ubuntu to Debian

Kali Linux is based on Debian (Debian Wheezy). This turned out to be a great move by Offensive-
Security. The New Kali is much more comfortable to use than its predecessor.

File Hierarchy Standard Compliance

In the words of ‘MUTS’ from Offensive Security, “What this means is that instead of having to
navigate through the /pentest tree, you will be able to call any tool from anywhere on the system as
every application is included in the system path.” This is again a very welcome change in Kali.

Customizations of Kali ISOs

If need be, we can now build our own customizations of Kali Linux. These ISOs can be
bootstrapped directly from the repositories maintained by Offensive Security.

ARM Devices Support

Kali is available for the following ARM devices: rk3306 mk/ss808, Raspberry Pi, ODROID U2/X2,
Samsung Chromebook, EfikaMX, Beaglebone Black, CuBox and Galaxy Note 10.1

Easier Updating and Upgrading

Packages on Kali can be updated with ease without worrying about ‘breaking’ something. This is
because the packages in the Kali repositories are ‘Debian Compliant’. The Kali Distribution itself
can be upgraded to newer version without the need for re-installing the distro.

300+ PenTesting Tools

This is quite a large collection and chances are that we won’t be needing all of them and we might
be needing some that are not included by default. However packages can always be grabbed from
the repositories at will, so that’s never a problem.

What is this ‘Forensics Mode’?

While booting up Kali Linux, an option exists for ‘Live Forensic Mode’ (Figure 2). This is quite a
useful feature if we want to do some real world forensic work. When into Forensics Mode, the
internal Hard Disk is not touched in any manner. The People at Offensive Security Performed a
Hash Comparison test where Hashes were taken of the Hard Drive before and after using Kali in
forensics mode. At the end of the test, the hashes matched suggesting that no changes were
made during the operation. Also worth noticing is that the Auto mount of Removable Media is
disabled while in Forensics mode.

Metasploit Framework in Kali

The discussion on Kali (or Backtrack for that matter) would be incomplete without a mention of how
well the Metasploit Framework is integrated with this distro. While ‘msfconsole’ brings it up,
‘msfupdate’ can update the metaspoit framework. Like in Backtrack, POSTGRESQL is used to
store the database.
The guys from offensive security and rapid7 (people behind the metasploit project), co-operated to
pre-load Kali Linux with msfpro (the professional web-service version of metasploit framework).
Metasploit in Kali has full tech support from rapid7.

Tools in Kali Linux

Tools are mostly the same as those found in Backtrack. However, in the Kali Linux menu, 10
Security tools have been highlighted as the Top 10 (Figure 4). Anyone who has worked on BT
would have no trouble guessing which tools would be available on Kali and which need to be
grabbed from the repositories. More than 300 tools come packaged with Kali which are enough to
serve the needs of most PenTests. The Top 10 tools in Kali Linux are mentioned below:
· Aircrack-ng – For wireless Cracking
· Burpsuite – For Web Applications Pentesting
· Hydra – For online Brute-Forcing of Passwords
· John – For offline Password Cracking
· Maltego – For Intelligence Gathering
· Metasploit Framework – For Exploitation
· Nmap – For Network Scanning
· Owasp-zap – For finding vulnerabilities in web applications
· Sqlmap – For exploiting SQL injection Vulnerabilities
· Wireshark – Network Protocol Analyzer

Kali Community Support

Kali Linux has an official IRC Channel on the Freenode network,# kali-linux. It provides a good
platform to interact with other users of Kali and get support.
Kali Linux provides three official repositories:
· http.kali.org: main package repository
· security.kali.org: security packages
· cdimage.kali.org: ISO images

Subtle differences noticed while regular work on Kali

One had to bring up the Graphical Interface manually by typind ‘startx’ in Backtrack. However Kali
loads up the Graphical User Interface by default.
Kali Linux environment is much cleaner and appears more stable than Backtrack 5
The Nessus Vulnerability scanner is not installed in Kali by default (as it was in Backtrack 5). You
would have to install it manually from the debian package.
Kali comes with a Graphical Packages installer which can be used to install new packages with the click of the mouse. It can brought up by typing the command: gpk-application

In Backtrack, several PenTesters faced issues in getting their Bluetooth up and running. The
Backtrack forums are filled with people troubleshooting their Bluetooth devices. In Kali Linux no
such problem was noticed and the Bluetooth works fine.
Firefox is replaced by Iceweasal which doesn’t matter much as they are both similar. However the
Iceweasal Browser in Kali doesn’t come pre-loaded with plug-ins like ‘no-script’ as in Firefox in
Backtrack. Iceweasal comes clean.
Small issues like inability to control your backlight in Backtrack have been fixed in Kali Linux. So you
would have a smoother working environment.

Summary

Kali Linux definitely turned out to be everything that a Penetration Tester would want from a Linux
distro. It does have room for improvements though and the developers are working on it constantly
to make it better. It addresses the problems Backtrack 5 had and it is significantly different from its
predecessor, yet any PenTester who was comfortable using Backtrack 5 would find his way around
in Kali Linux with ease. The default login in Kali Linux is in ‘root’ mode, so it is not the everyday
desktop OS and is not recommended for those new to ‘Linux’. However it fits the Penetration

You can download Kali-Linux from their official site here:https://www.kali.org/downloads/

Post navigation

Linux…. Where did it come from?
Turning your Android into a hacking device

Related Articles

BlackArch Linux v2019.09.01 – Penetration Testing Distribution

- Operating Systems
September 9, 2019

Commando VM v2.0 – The First Full Windows-based Penetration Testing OS

- Operating Systems
August 9, 2019

OPS City – Build and Run Nanos Unikernels

- Operating Systems
July 9, 2019
hacker gadgets
hacker phone covers

Recent Posts

dnstwist v20201228 releases: Domain name permutation engine for detecting typo squatting, phishing and corporate espionage

dnstwist v20220815 releases: Domain name permutation engine for detecting typo squatting, phishing and corporate espionage

August 16, 2022
RPCMon: RPC Monitor tool based on Event Tracing for Windows

RPCMon: RPC Monitor tool based on Event Tracing for Windows

August 16, 2022
Woman Sentenced to 151 Months in Prison for Selling GHB

Woman Sentenced to 151 Months in Prison for Selling GHB

August 16, 2022
riskscanner: Open source multi-cloud security compliance scanning platform

riskscanner: Open source multi-cloud security compliance scanning platform

August 15, 2022
Brazilian Crypto Investment Platform Suspends Withdrawals

Brazilian Crypto Investment Platform Suspends Withdrawals

August 15, 2022
RedGuard - C2 Front Flow Control Tool, Can Avoid Blue Teams, AVs, EDRs Check

RedGuard – C2 Front Flow Control Tool, Can Avoid Blue Teams, AVs, EDRs Check

August 15, 2022

Social Media Hacking

SocialPath – Track users across Social Media Platforms

SocialPath – Track users across Social Media Platforms

- Social Media Hacking
October 16, 2019October 16, 2019

SocialPath is a django application for gathering social media intelligence on specific username. It checks for Twitter, Instagram, Facebook, Reddit...

SocialScan – Check Email Address and Username Availability on Online Platforms

SocialScan – Check Email Address and Username Availability on Online Platforms

June 17, 2019
Shellphish – Phishing Tool For 18 Social Media Apps

Shellphish – Phishing Tool For 18 Social Media Apps

June 10, 2019July 27, 2019
WhatsApp Hacking using QRLJacking

WhatsApp Hacking using QRLJacking

May 2, 2019May 19, 2019
How to Hack any Facebook Account with Z-Shadow

How to Hack any Facebook Account with Z-Shadow

April 26, 2019June 29, 2020
hacker buffs

About Us

Haxf4rall is a collective, a good starting point and provides a variety of quality material for cyber security professionals.

Join Our Community!

Please wait...
Get the latest News and Hacking Tools delivered to your inbox.
Don't Worry ! You will not be spammed

Active Members

Submit a Tool

Hackers Handbook 2018


Grab your copy here

ABOUT US

Haxf4rall is a collective, a good starting point and provides a variety of quality material for cyber security professionals.

Our primary focus revolves around the latest tools released in the Infosec community and provide a platform for developers to showcase their skillset and current projects.

COMPANY
  • Contact Us
  • Disclaimer
  • Hacker Gadgets
  • LANC Remastered
  • PCPS IP Puller
  • Privacy Policy
  • Sitemap
  • Submit your Tool
Menu
  • Contact Us
  • Disclaimer
  • Hacker Gadgets
  • LANC Remastered
  • PCPS IP Puller
  • Privacy Policy
  • Sitemap
  • Submit your Tool
Live Chat
RESOURCES
  • Attack Process
  • Become a Hacker
  • Career Pathways
  • Dark Web
  • Hacking Books
  • Practice Your Skills
  • Recommended Courses
  • Simple Setup – Hacker 101
Menu
  • Attack Process
  • Become a Hacker
  • Career Pathways
  • Dark Web
  • Hacking Books
  • Practice Your Skills
  • Recommended Courses
  • Simple Setup – Hacker 101
Get Started
TOOLBOX
  • Anonymity
  • Bruteforce
  • DoS – Denial of Service
  • Information Gathering
  • Phishing
  • SQL Injection
  • Vulnerability Scanners
  • Wifi Hacking
Menu
  • Anonymity
  • Bruteforce
  • DoS – Denial of Service
  • Information Gathering
  • Phishing
  • SQL Injection
  • Vulnerability Scanners
  • Wifi Hacking
Tools Directory

2014 – 2020 | Haxf4rall.com               Stay Connected:

Facebook Twitter Google-plus Wordpress
Please wait...

Join Our Community

Subscribe now and get your free HACKERS HANDBOOK

Don't Worry ! You will not be spammed
SIGN UP FOR NEWSLETTER NOW