Ethical Hacking

When we talk about hacking, the first thing that comes into our mind is about stealing password, data theft, stealing money from bank account and similar other criminal activities.  But hacking always is not necessarily a criminal or destructive act. Organisations hire Ethical Hackers for doing penetration testing for their products.

Hackers are generally categorised into three types.  The Black Hat, who are responsible for writing Malware, creating phishing websites and stealing data.  The white hat hackers, who use the powers for good rather than evil. They commonly known as Ethical Hackers.  There is another type, the Grey Hat hacker, who is neither black nor white. Grey Hat hackers are kind of blend of Black Hat and White Hat.

The most popular operating system used by the hackers is the Kali Linux.  In 2006 BackTrack operating system was first built, that was focused on security. BackTrack was developed on top of on Knoppix Linux distribution. Later in 2013 Offensive Security team rebuild the BackTrack on top of Debian Linux and named it as Kali Linux.

Kali Linux comes installed with a predefined set of software or tools that are useful for penetration testing.  Few tools like Metasploit, nmap, Wireshark, John the Ripper, Burpsuite come pre-installed with this operating system.

Kali Linux is a free and open source software. It can be downloaded from the official website as an ISO file, VMware image or VirtualBox image. Also the source code of the operating system is available.  So, it is easy to customise based on the requirements and preference of the user. The recommended configuration for running Kali Linux is 20 GB of disk space and 1GB RAM for 32 bit processor and 2 GB for 64 bit processor. Installing Kali Linux is a painful process.  So, it is recommended to use the live CD version or the VM image.


Leave a Reply

Your email address will not be published. Required fields are marked *