Merge pull request #29650 from wxy/20230628.1-️-Why-is-Kali-Linux-Preferred-by-Hackers

ATRP:published/20230628.1 ️ Why is Kali Linux Preferred by Hackers.md
This commit is contained in:
Xingyu.Wang 2023-07-04 15:24:12 +08:00 committed by GitHub
commit 5f67016b6a
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2 changed files with 178 additions and 184 deletions

View File

@ -0,0 +1,178 @@
[#]: subject: "Why is Kali Linux Preferred by Hackers?"
[#]: via: "https://www.debugpoint.com/why-kali-linux/"
[#]: author: "Arindam https://www.debugpoint.com/author/admin1/"
[#]: collector: "lkxed"
[#]: translator: "ChatGPT"
[#]: reviewer: "wxy"
[#]: publisher: "wxy"
[#]: url: "https://linux.cn/article-15966-1.html"
为什么黑客更喜欢使用 Kali Linux
======
![][0]
> 以下是为什么大多数黑客和渗透测试人员喜欢使用 Kali Linux 的几个原因。
Kali Linux 是一个基于 Debian “测试版” 的 Linux 操作系统,创建于近十年前。在过去几年里,它在黑客和网络安全专业人员中非常流行。随着对数字基础设施的越来越多的依赖和网络威胁的不断增长,网络安全对于普通用户和企业来说变得更加重要。
道德黑客和渗透测试人员在识别漏洞和加强系统安全方面发挥着重要作用。由于 Kali Linux 具备为安全测试和分析而量身定制的全面工具和功能,因此成为他们的首选操作系统。
![带有 Xfce 桌面环境的 Kali Linux][1]
### 概述
[Kali Linux][2] 由 Offensive Security一家美国信息安全公司维护并得到社区中数千名贡献者的支持。它跟随 Debian 的 “测试版” 分支的发展,保持与最新软件包的同步,为黑客们提供了最新模块来进行工作。
此外Kali Linux 支持多种架构,例如 x86、x86-64、armel 和 armhf这有助于黑客在广泛的硬件范围内使用。
使用此发行版的最大优势之一是它适用于多个技术平台,你可以下载和使用。以下是其中一些平台:
- 32 位和 64 位的安装镜像ISO
- 预构建的虚拟机镜像
- ARM 架构镜像
- 用于移动设备的安卓镜像
- Docker 和 LXD 镜像
- 可在各个厂商提供的云中使用
- 只读的 LIVE ISO 镜像
- 可在 Windows 的 Linux 子系统WSL上使用
### 为何它备受青睐
#### 强大的渗透测试工具
Kali Linux 提供了丰富的渗透测试工具,使黑客能够识别并利用漏洞。这些工具包括网络扫描器、密码破解器、无线攻击框架和 Web 应用程序评估工具。这个操作系统内置了如此之多的工具,极大地简化了黑客的工作流程,使他们能够有效专注于目标。
#### 全面的安全评估
使用这个发行版,黑客可以对各种目标进行全面的安全评估。他们可以模拟真实攻击,分析系统弱点,制定有效的安全策略。该操作系统提供了漏洞扫描、网络映射和系统指纹识别等工具,使黑客能够从不同角度评估目标系统的安全状况。
#### 反取证分析和事件响应
Kali Linux 还包括用于数字取证和事件响应的工具。黑客可以利用这些工具来调查安全漏洞,收集证据和分析受损系统。该操作系统支持数据恢复、内存分析和网络取证,有助于进行彻底的调查,并帮助恢复遭受损害的系统。
#### 无线网络审计
由于其固有的弱点无线网络往往是黑客的主要目标。Kali Linux 提供了全面的用于审计和保护无线网络的工具。黑客可以使用这些工具来识别弱加密协议,发现隐藏网络,并进行数据包分析以检测恶意活动。这使得他们能够评估无线网络的安全性并提出缓解策略。
### 大量的工具
以下是默认情况下截至最新版本Kali Linux 提供的一些工具类别的简要列表:
- **信息收集**
- DNS 分析
- IDS/IPS 识别
- 活动主机识别
- 网络和端口扫描器
- OSINT 分析
- 路由分析
- SMB 分析
- SMTP 分析
- SNMP 分析
- SSL 分析
- **漏洞分析**
- 模糊测试工具
- VoIP 工具
- **Web 应用程序分析**
- CMS 和框架识别
- Web 应用程序代理
- Web 爬虫和目录暴力破解
- Web 漏洞扫描器
- **数据库评估**
- SQLite 数据库浏览器
- **密码攻击**
- 离线攻击工具
- 在线攻击工具
- 哈希传递工具
- 密码分析和密码列表
- **无线网络攻击**
- 802.11 无线工具
- 蓝牙攻击工具
- **逆向工程工具**
- Clang
- NASM shell
- **利用工具**
- Metasploit
- Searchsploit
- MSF 载荷生成器
- 社会工程学工具包
- **嗅探和欺骗**
- 网络嗅探器
- 欺骗和中间人攻击
- 后渗透
- **取证**
- 反取证工具
- 取证镜像工具
- PDF 取证工具
- Sleuth Kit 套件
- **报告工具**
- Cutycapt
- Faraday start
- Pipal
- **社会工程学工具**
你可以在详尽的工具门户网站了解更多信息:
> **[访问 Kali Linux 工具门户网站][3]**
![Kali Linux Tools][4]
### 开源特性
黑客偏爱 Kali Linux 的主要原因之一是它的开源特性。作为一款开源操作系统Kali Linux 允许黑客访问和修改源代码以满足其需求。这使得他们可以自由定制系统并添加自己的工具或功能。开源社区还积极参与开发和改进 Kali Linux以确保其与最新的安全技术保持同步。
### 社区支持与合作
Kali Linux 拥有一个庞大的安全专业人员、黑客和爱好者社区。这个社区通过分享知识、开发新工具和为其他用户提供支持来积极合作,以增强操作系统的功能。
可通过论坛、在线教程和社区驱动的文档获取宝贵资源并在需要时寻求帮助,确保使用 Kali Linux 的黑客能够获得支持。
团队还提供了多种培训和学习方式。其中也包括了一个学习路径,供希望在网络安全领域追求职业发展的学生参考,并提供相关认证。
### 定制和灵活性
另一个优点是 Kali Linux 高度的定制和灵活性。黑客可以根据自己的特定需求和喜好来定制操作系统。他们可以按照自己的要求安装和配置工具,创建自定义脚本并构建个性化的工作流程。这种定制水平使得黑客可以优化自己的生产力并简化渗透测试过程。
### 持续更新和改进
Kali Linux 是一个不断更新和改进的操作系统。开发人员和社区成员积极致力于增强现有工具、添加新功能并解决任何安全漏洞。这些更新确保使用 Kali Linux 的黑客可以获得最新的工具和技术,使他们始终处于网络安全进展的前沿。
![Kali Linux 从其自己的源分发软件包][5]
### 道德使用
重要的是要注意Kali Linux 旨在用于道德黑客和安全测试目的。道德黑客利用他们的技能来发现漏洞并保护系统,而不是从事恶意活动。
Kali Linux 倡导对黑客工具的负责和合法使用,强调获得适当授权和遵守道德准则的重要性。该操作系统是网络安全专业人员增强组织安全性、促进更安全的数字环境的强大工具。
简而言之,**请勿将** Kali Linux 用于非法或未经授权的用途。
### 结论
我希望这份概述介绍了 Kali Linux 及其为全球安全专业人员所偏爱的免费开源操作系统的原因。它以 Debian 为基础,配备了数千种工具和便捷的访问方式,使它成为每个人都值得考虑的选择。
你可以在 [官方网站][7] 上下载 Kali Linux。
*题图MJ/95d89a95-50fe-4fdf-a06a-e4287092cee9*
--------------------------------------------------------------------------------
via: https://www.debugpoint.com/why-kali-linux/
作者:[Arindam][a]
选题:[lkxed][b]
译者ChatGPT
校对:[wxy](https://github.com/wxy)
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创编译,[Linux中国](https://linux.cn/) 荣誉推出
[a]: https://www.debugpoint.com/author/admin1/
[b]: https://github.com/lkxed/
[1]: https://www.debugpoint.com/wp-content/uploads/2023/05/Kali-Linux-with-Xfce-Desktop-Environment.jpg
[2]: https://www.kali.org/
[3]: https://www.kali.org/tools/
[4]: https://www.debugpoint.com/wp-content/uploads/2023/05/Kali-Linux-Tools.jpg
[5]: https://www.debugpoint.com/wp-content/uploads/2023/06/Kali-Linux-distribute-packages-from-its-own-sources.jpg
[6]: https://www.debugpoint.com/kali-linux-introduction/
[7]: https://www.kali.org/get-kali/
[0]: https://img.linux.net.cn/data/attachment/album/202307/04/151945ol68v2ez28e6exzq.jpg

View File

@ -1,184 +0,0 @@
[#]: subject: "Why is Kali Linux Preferred by Hackers?"
[#]: via: "https://www.debugpoint.com/why-kali-linux/"
[#]: author: "Arindam https://www.debugpoint.com/author/admin1/"
[#]: collector: "lkxed"
[#]: translator: " "
[#]: reviewer: " "
[#]: publisher: " "
[#]: url: " "
Why is Kali Linux Preferred by Hackers?
======
**A few points why Kali Linux is used by most of the hackers and pen testers.**
Kali Linux is a Debian “testing” based Linux operating system created almost a decade ago. Over the last few years has gained significant popularity among hackers and cybersecurity professionals. With the ever-increasing dependency on digital infrastructures and ever-growing online threats, cybersecurity has become more relevant today for average users and businesses.
Ethical hackers and penetration testers play a vital role in identifying vulnerabilities and strengthening the security of systems. Kali Linux has emerged as their go-to operating system due to its comprehensive tools and features tailored for security testing and analysis.
![Kali Linux with Xfce Desktop Environment][1]
### Overview
[Kali Linux][2] is maintained by Offensive Security, an American information security company and contributed by thousands from the community. It follows the Debian “testing” branch, which remains up to date with bleeding edge packages to provide hackers with the latest modules for their work.
In addition, it supports multiple architectures such as x86, x86-64, armel and armhf which helps hackers using a wide hardware spectrum.
One of the best advantages of using this distro is that it is available for multiple tech platforms, which you can download and use. Here are some of them:
- 32-bit and 64-bit installer images (ISO)
- Virtual machine pre-built images
- ARM images
- Android images for mobile devices
- Docker and LXD images
- Cloud availability from various vendors
- Read only LIVE ISO images
- Available on Windows Subsystem for Linux (WSL)
### Reasons why it is preferred
#### Powerful Penetration Testing Tools
Kali Linux offers a vast arsenal of penetration testing tools that enable hackers to identify and exploit vulnerabilities. These tools range from network scanners and password crackers to wireless attack frameworks and web application assessment utilities. The availability of such tools within a single operating system greatly simplifies the workflow of hackers, allowing them to focus on their objectives effectively.
#### Comprehensive Security Assessments
With this distribution, hackers can perform comprehensive security assessments on various targets. They can simulate real-world attacks, analyze system weaknesses, and devise effective security strategies. The operating system provides tools for vulnerability scanning, network mapping, and system fingerprinting, enabling hackers to assess the security posture of target systems from different angles.
#### Forensic Analysis and Incident Response
Kali Linux also includes tools for digital forensics and incident response. Hackers can leverage these tools to investigate security breaches, gather evidence, and analyze compromised systems. The operating system supports data recovery, memory analysis, and network forensics, facilitating thorough investigations and aiding in the recovery of compromised systems.
#### Wireless Network Auditing
Wireless networks are often a prime target for hackers due to their inherent vulnerabilities. Kali Linux offers comprehensive tools for auditing and securing wireless networks. Hackers can use these tools to identify weak encryption protocols, discover hidden networks, and perform packet analysis to detect malicious activity. This allows them to assess the security of wireless networks and propose mitigation strategies.
### Vast list of Tools
Heres a brief list of tools categories which are available by default (as of the latest release):
- DNS analysis
- IDS/IPS identification
- Live host identification
- Network and port scanner
- OSINT analysis
- Route analysis
- SMB analysis
- SMTP analysis
- SNMP analysis
- SSL analysis
- Fuzzing tools
- VoIP tools
- CMS and framework identification
- Web application proxies
- Web crawlers and directory bruteforce
- Web vulnerability scanners
- SQLite database browser
- Offline attack tools
- Online attack tools
- Passing the hash tools
- Password profiling and word lists
- 802.11 Wireless tools
- Bluetooth attack tools
- Clang
- NASM shell
- Metasploit
- Searchsploit
- MSF payload creator
- Social engineering toolkit
- Network sniffers
- Spoofing and MITM
- Post exploitation
- Forensic carving tools
- Forensic imaging tools
- PDF forensics tools
- Sleuth kit suite
- Cutycapt
- Faraday start
- Pipal
- **Information gathering**
- **Vulnerability analysis**
- **Web application analysis**
- **Database assessment**
- **Password attacks**
- **Wireless attacks**
- **Reverse engineering tools**
- **Exploitation tools**
- **Sniffing and spoofing**
- **Forensics**
- **Reporting tools**
- **Social engineering tools**
You can learn more in the comprehensive tools portal:
[Visit Kali Linux Tools Portal][3]
![Kali Linux Tools][4]
### Being open-source
One of the primary reasons why hackers prefer Kali Linux is its open-source nature. Being an open-source operating system, it allows hackers to access and modify the source code as per their requirements. This grants them the freedom to customize the system and add their own tools or functionalities. The open-source community also actively contributes to developing and improving Kali Linux, ensuring that it stays up-to-date with the latest security techniques and technologies.
### Community Support and Collaboration
Kali Linux has a vast supportive community of security professionals, hackers, and enthusiasts. This community actively collaborates to enhance the operating systems capabilities by sharing knowledge, developing new tools, and providing support to fellow users.
The availability of forums, online tutorials, and community-driven documentation ensures that hackers using Kali Linux can access valuable resources and seek assistance whenever needed.
The team also provides several training and learning mediums. These also have a learning path for students who want to pursue a career in cybersecurity, including certifications.
### Customization and Flexibility
Another advantage is its high degree of customization and flexibility. Hackers can tailor the operating system to suit their specific needs and preferences. They can install and configure tools as per their requirements, create custom scripts, and build personalized workflows. This level of customization allows hackers to optimize their productivity and streamline their penetration testing processes.
### Continuous Updates and Improvements
Kali Linux is a dynamic operating system that undergoes continuous updates and improvements. The developers and community members actively work on enhancing existing tools, adding new features, and addressing any security vulnerabilities. These updates ensure that hackers using Kali Linux have access to the latest tools and techniques, keeping them at the forefront of cybersecurity advancements.
![Kali Linux distribute packages from its own sources][5]
### Ethical Use
It is important to note that Kali Linux is intended for ethical hacking and security testing purposes. Ethical hackers use their skills to identify vulnerabilities and protect systems, not to engage in malicious activities.
Kali Linux promotes the responsible and legal use of hacking tools, emphasizing the importance of obtaining proper authorization and adhering to ethical guidelines. The operating system is a powerful tool for cybersecurity professionals to enhance organisations security and contribute to a safer digital landscape.
In a nutshell, **DO NOT USE** Kali Linux for illegal or unauthorised usage.
### Conclusion
I hope this overview [introduces Kali Linux][6] and why it is a preferred free and open-source operating system by security professionals worldwide. Its Debian base, armed with thousands of tools and easy access, makes it a compelling choice for everyone.
You can download Kali Linux on the [official website][7].
--------------------------------------------------------------------------------
via: https://www.debugpoint.com/why-kali-linux/
作者:[Arindam][a]
选题:[lkxed][b]
译者:[译者ID](https://github.com/译者ID)
校对:[校对者ID](https://github.com/校对者ID)
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创编译,[Linux中国](https://linux.cn/) 荣誉推出
[a]: https://www.debugpoint.com/author/admin1/
[b]: https://github.com/lkxed/
[1]: https://www.debugpoint.com/wp-content/uploads/2023/05/Kali-Linux-with-Xfce-Desktop-Environment.jpg
[2]: https://www.kali.org/
[3]: https://www.kali.org/tools/
[4]: https://www.debugpoint.com/wp-content/uploads/2023/05/Kali-Linux-Tools.jpg
[5]: https://www.debugpoint.com/wp-content/uploads/2023/06/Kali-Linux-distribute-packages-from-its-own-sources.jpg
[6]: https://www.debugpoint.com/kali-linux-introduction/
[7]: https://www.kali.org/get-kali/