Professional Documents
Culture Documents
Ethical Hacking Using Kali Linux
Ethical Hacking Using Kali Linux
Ethical Hacking Using Kali Linux
https://medium.com/edureka/ethical-hacking-using-kali-linux-fc140eff3300 1/10
11/8/21, 3:27 PM Ethical Hacking using Kali Linux — A Beginner’s Guide To Kali Linux | by Aryya Paul | Edureka | Medium
There are a wide array of reasons as to why one should use Kali Linux. Let me list down a
few of them:
1. As free as it can get — Kali Linux has been and will always be free to use.
2. More tools than you could think of — Kali Linux comes with over 600 different
penetration testing and security analytics related tool.
3. Open-source — Kali, being a member of the Linux family, follows the widely
appreciated open-source model. Their development tree is publicly viewable on Git and
all of the code is available for your tweaking purposes.
RAM for i386 and amd64 architectures, minimum: 1GB, recommended: 2GB or more.
List of Tools
Below is a list of tools that come pre-installed for ethical hacking using Kali Linux. This list
is by no means expansive as Kali has a plethora of tools, all of which cannot be listed and
explained in one article.
Aircrack-ng
https://medium.com/edureka/ethical-hacking-using-kali-linux-fc140eff3300 2/10
11/8/21, 3:27 PM Ethical Hacking using Kali Linux — A Beginner’s Guide To Kali Linux | by Aryya Paul | Edureka | Medium
Aircrack-ng is a suite of tools used to assess WiFi network security. It focuses on key areas
of WiFi security:
Monitoring: Packet capture and export of data to text files for further processing by
third-party tools.
Attacking: Replay attacks, de-authentication, fake access points, and others via packet
injection.
Testing: Checking WiFi cards and driver capabilities (capture and injection).
All tools are command line which allows for heavy scripting. A lot of GUIs have taken
advantage of this feature. It works primarily Linux but also Windows, OS X, FreeBSD,
OpenBSD, NetBSD, as well as Solaris.
Nmap
https://medium.com/edureka/ethical-hacking-using-kali-linux-fc140eff3300 3/10
11/8/21, 3:27 PM Ethical Hacking using Kali Linux — A Beginner’s Guide To Kali Linux | by Aryya Paul | Edureka | Medium
Network Mapper, also commonly known as Nmap, is a free and open source utility for
network discovery and security auditing. Nmap uses raw IP packets in stealthy ways to
determine what hosts are available on the network, what services (application name and
version) those hosts are offering, what operating systems they are running, what type of
packet filters/firewalls are in use, and dozens of other characteristics.
Many systems and network administrators also find it useful for tasks like:
network inventory
THC Hydra
When you need to brute force crack a remote authentication service, Hydra is often the tool
of choice. It can perform rapid dictionary attacks against more than 50 protocols, including
telnet, FTP, HTTP, HTTPs, SMB, several databases, and much more. it can be used to crack
into web scanners, wireless networks, packet crafters, etc.
Nessus
https://medium.com/edureka/ethical-hacking-using-kali-linux-fc140eff3300 4/10
11/8/21, 3:27 PM Ethical Hacking using Kali Linux — A Beginner’s Guide To Kali Linux | by Aryya Paul | Edureka | Medium
Nessus is a remote scanning tool that you can use to check computers for security
vulnerabilities. It does not actively block any vulnerabilities that your computers have but it
will be able to sniff them out by quickly running 1200+ vulnerability checks and throwing
alerts when any security patches need to be made.
WireShark
WireShark is an open-source packet analyzer that you can use free of charge. With it, you
can see the activities on a network from a microscopic level coupled with pcap file access,
customizable reports, advanced triggers, alerts, etc. It is reportedly the world’s most widely-
used network protocol analyzer for Linux.
https://medium.com/edureka/ethical-hacking-using-kali-linux-fc140eff3300 5/10
11/8/21, 3:27 PM Ethical Hacking using Kali Linux — A Beginner’s Guide To Kali Linux | by Aryya Paul | Edureka | Medium
Step 2: Kill any processes that might interfere with the scan process. Always kill network
administrator first. You might need to run the shown command more than once.
https://medium.com/edureka/ethical-hacking-using-kali-linux-fc140eff3300 6/10
11/8/21, 3:27 PM Ethical Hacking using Kali Linux — A Beginner’s Guide To Kali Linux | by Aryya Paul | Edureka | Medium
Step 3: After you have successfully killed all process, run the command — airodump-ng
<interface-name>. It should produce a list of access points as shown below:
airodump-ng wlo1
Step 4: Choose the access point and run it along with the -w flag to write the result into a
file. Our file is called capture.
Step 5: Running the above command should show you the MAC address of the devices
connected to that access point under ‘stations’.
https://medium.com/edureka/ethical-hacking-using-kali-linux-fc140eff3300 7/10
11/8/21, 3:27 PM Ethical Hacking using Kali Linux — A Beginner’s Guide To Kali Linux | by Aryya Paul | Edureka | Medium
Step 6 — This is the most important step in ethical hacking using Kali Linux. Here we will
broadcast a de-authentication signal to the access point we have chosen to attack. This
disconnects the devices connected to the access point. Since these devices will most likely
have the password stored they will try to auto reconnect. This will start a 4-way handshake
between the device and the access point and will be captured in the scan going on from step
4 (yes, that scan is still running in the background).
Step 7: Now we will use crunch along with aircrack-ng. Crunch is a wordlist generator. This
process to crack passwords assumes you know a little about the password, for example, the
length, some specific characters etc. The more you know the faster the process. Here I have
tried to generate a list of words that begin with ‘sweetship’ as I know that password
contains that phrase. The result is piped into the aircrack command which takes the capture
files and compares the key values.
https://medium.com/edureka/ethical-hacking-using-kali-linux-fc140eff3300 8/10
11/8/21, 3:27 PM Ethical Hacking using Kali Linux — A Beginner’s Guide To Kali Linux | by Aryya Paul | Edureka | Medium
Step 8: The scan results should look something like this depending on the parameters you
have input.
Step 9: When the password is matched. It shows it in the bracket following ‘key found’.
https://medium.com/edureka/ethical-hacking-using-kali-linux-fc140eff3300 9/10
11/8/21, 3:27 PM Ethical Hacking using Kali Linux — A Beginner’s Guide To Kali Linux | by Aryya Paul | Edureka | Medium
This brings us to the end of our article on Ethical Hacking using Kali Linux. I hope you
found this article informative and added value to your knowledge. If you wish to check out
more articles on the market’s most trending technologies like Artificial Intelligence,
DevOps, Cloud, then you can refer to Edureka’s official site.
https://medium.com/edureka/ethical-hacking-using-kali-linux-fc140eff3300 10/10