25
Operating system

Operating project

Embed Size (px)

Citation preview

Page 1: Operating project

Operating system

Page 2: Operating project

OPERATING SYSTEM

TopicKali Limoux Operating System

Class:MITM-Part (2)

SUBITTED BY: ISMAT SHAKOOR

SUBJECT: Operating SystemSubmitted To:

SIR: Shahzad Jaffar

Page 3: Operating project

OPERATING SYSTEM

TABLE OF CONTENT page No1. Acknowledgement 05 2. Introducation of kali Linux 062.0More than 600 penetration testing tools included 062.1Free (as in beer) and always will be 062.2Open source Git tree 062.3FHS compliant 062.4Wide-ranging wireless device support  062.5Wide-ranging wireless device support 062.6Custom kernel, patched for injection 062.7Developed in a secure environment 06.2.8GPG signed packages and repositories 06 2.9Multi-language support 072.10Completely customizable 072.11ARMEL and ARMHF support 073.History of kali Linux 073.0What is the history of Kali Linux and Backtrack? 073.1So why bother changing the name? 084.How to Install Kali Linux step-by-Step Guide 08_165.Understanding the directory structure of kali Linux 0175.0Root 0175.1bin user binaries 0175.2sbin system binaries 0175.3etc Configuration File 0175.4dev device file 0175.5process information 018 5.6Variable file 0185.7Temporary file 0185.8User program 0185.9Home directories 0185.10Boot loader file 019 5.11System libraries 0195.12Optional add on application 0195.13Mount directory 019

Page 4: Operating project

OPERATING SYSTEM

5.14Removable media device 0195.15Service data 019 6.Commands of kali Linux 20 7.conclution 21

Page 5: Operating project

OPERATING SYSTEM

Acknowledgment

Acknowledgment "We have taken efforts in this project. This book would have not been possible without the support and encouragement of our Teacher. We are highly grateful to members of group for their guidance and constant supervision as well as for providing necessary information regarding the project & also for their support in completing the project. If you would ever like any more information from us, please feel free to call me or any member of my staff directly. Enclosed you will find information cards should you know of anyone who may benefit from our services of server room. I would like to say thanks to my friends for helping me along with the production of this book. My thanks and appreciations also go to my colleague in developing the project and people who have willingly helped me out with their abilities." I would like to take this opportunity to my teacher Prof. Shahzad jaffar whose guidance and encouragement has enabled me to complete this project. I learnt a lot of things from this project.

Page 6: Operating project

OPERATING SYSTEM

Kali Linux is a Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. Kali contains several hundred tools aimed at various information security tasks, such as  Penetration Testing, Forensics and Reverse Engineering. Kali Linux is developed, funded and maintained by offensive security , a leading information security training company.

Kali Linux was released on the 13th March, 2013 as a complete, top-to-bottom rebuild of back track security adhering completely to debain development standards.

More than 600 penetration testing tools included: After reviewing every tool that was included in BackTrack, we eliminated a great number of tools that either simply did not work or which duplicated other tools that provided the same or similar functionality. Details on what’s included are on the kali toolssite.

Free (as in beer) and always will be: Kali Linux, like BackTrack, is completely free of charge and always will be. You will never, ever have to pay for Kali Linux.

Open source Git tree: We are committed to the open source development model and our development tree is available for all to see. All of the source code which goes into Kali Linux is available for anyone who wants to tweak or rebuild packages to suit their specific needs.

FHS compliant: Kali adheres to the File System Hierarchy Standard, allowing Linux users to easily locate binaries, support files, libraries, etc.

Wide-ranging wireless device support: A regular sticking point with Linux distributions has been supported for wireless interfaces. We have built Kali Linux to support as many wireless devices as we possibly can, allowing it to run properly on a wide variety of hardware and making it compatible with numerous USB and other wireless devices.

Custom kernel, patched for injection: As penetration testers, the development team often needs to do wireless assessments, so our kernel has the latest injection patches included.

Developed in a secure environment: The Kali Linux team is made up of a small group of individuals who are the only ones trusted to commit packages and interact with the repositories, all of which is done using multiple secure protocols.

Page 7: Operating project

OPERATING SYSTEM

GPG signed packages and repositories: Every package in Kali Linux is signed by each individual developer who built and committed it, and the repositories subsequently sign the packages as well.

Multi-language support: Although penetration tools tend to be written in English, we have ensured that Kali includes true multilingual support, allowing more users to operate in their native language and locate the tools they need for the job.

Completely customizable: We thoroughly understand that not everyone will agree with our design decisions, so we have made it as easy as possible for our more adventurous users to customize kali Linux to their liking, all the way down to the kernel.

ARMEL and ARMHF support: Since ARM-based single-board systems like the Raspberry Pi and BeagleBone Black, among others, are becoming more and more prevalent and inexpensive, we knew that kali’s ARM support would need to be as robust as we could manage, with fully working installations for both ARMEL and ARMHF systems..

History of kali Linux

Looks like Kali Linux is a great success. Kali Linux is the successor to BackTrack, the much loved Linux Penetration Distro/ Operating System that is aimed at penetration testers and security professionals. Before we dive into our brief review – we thought it would be cool to give a brief history of how Kali Linux came to be.

What is the history of Kali Linux and Backtrack?We are all very familiar with Backtrack, which has been around for the last seven years – created and managed by Offensive Security, but what is the history of this famous Linux penetration testing distribution?

Much like we trace our ancestors back to Africa, so we trace Kali Linux back to Knoppix! Knoppix was (I think) one of the first ever bootable Live Linux Distro’s. Still in existence, Knoppix is a classic distro with a loyal community. Over time the Knoppix project was forked into WHoppix (yes the WH are meant to be capitalized) that was then re-forked into WHAX. WHAX was then re-branded and streamlined into the BackTrack that we all used. There is a common thread throughout these distros, (Knoppix, which became WHoppix, and then WHAX and finally into BackTrack); that is that the lineage focused on intrusion detection and digital forensics. BackTrack expanded the scope and allowed for many more tools to be incorporated into the distro. In any event, BackTrack had a long reign of almost seven years as the pentesters and hackers distro of choice. However, as of March 2013 the venerated distro was decommissioned and replaced by Kali Linux. Phew. Long story – but the bottom line is that Kali Linux is the result of a rich and colorful history.

Page 8: Operating project

OPERATING SYSTEM

So why bother changing the name?Kali Linux is so different that the fine folks over at Offensive Security thought that to solve the ‘inherent problems’ of BackTrack the authors needed a complete re-write. The main issue with BackTrack v1-v5 was that it was a headache for dependencies. Here was the problem: too many pentesting tools embedded within BackTrack all struggled to co-exist within the dependencies. Many pentesting and security tools where not regularly updated by their creators so the result was that trying to update the entire OS often caused conflicts and tools would simply stop working, crash or even cause other tools to crash. A good example of this is Ettercap which was not updated for a long time.

The solution was to rebuild the distro bottom-up by making Kali Debian based. Before with BackTrack there was a /pentest/ folder, whereas now it is all updated and managed by Debian packages.

Kali Linux has 300 tools which automatically work within the Kali ecosphere. Kali also has been created with the clean “File system Hierarchy Standard” and offers vast plug and play wireless support, with the only exception appearing to be broadcom.

How to Install Kali Linux 2.0 Sana in VMware Workstation Step-by-Step Guide

Page 17: Operating project

OPERATING SYSTEM

1. / – Root

Every single file and directory starts from the root directory. Only root user has write privilege under this directory. Please note that /root is root user’s home directory, which is not same as /.

2. /bin – User Binaries

Contains binary executables. Common Linux commands you need to use in single-user modes are located

under this directory. Commands used by all the users of the system are located here. For example: ps, ls, ping, grep, cp.

3. /sbin – System Binaries

Just like /bin, /sbin also contains binary executables. But, the linux commands located under this directory are used typically by

system aministrator, for system maintenance purpose. For example: iptables, reboot, fdisk, ifconfig, swapon

4. /etc – Configuration Files

Contains configuration files required by all programs. This also contains startup and shutdown shell scripts used to start/stop

individual programs. For example: /etc/resolv.conf, /etc/logrotate.conf

5. /dev – Device Files

Contains device files. These include terminal devices, usb, or any device attached to the system. For example: /dev/tty1, /dev/usbmon0

Page 18: Operating project

OPERATING SYSTEM

6. /proc – Process Information

Contains information about system process. This is a pseudo filesystem contains information about running process. For

example: /proc/{pid} directory contains information about the process with that particular pid.

This is a virtual filesystem with text information about system resources. For example: /proc/uptime

7. /var – Variable Files

var stands for variable files. Content of the files that are expected to grow can be found under this directory. This includes — system log files (/var/log); packages and database files

(/var/lib); emails (/var/mail); print queues (/var/spool); lock files (/var/lock); temp files needed across reboots (/var/tmp);

8. /tmp – Temporary Files

Directory that contains temporary files created by system and users. Files under this directory are deleted when system is rebooted.

9. /usr – User Programs

Contains binaries, libraries, documentation, and source-code for second level programs.

/usr/bin contains binary files for user programs. If you can’t find a user binary under /bin, look under /usr/bin. For example: at, awk, cc, less, scp

/usr/sbin contains binary files for system administrators. If you can’t find a system binary under /sbin, look under /usr/sbin. For example: atd, cron, sshd, useradd, userdel

/user/lib contains libraries for /usr/bin and /usr/sbin /user/local contains users programs that you install from source. For example,

when you install apache from source, it goes under /usr/local/apache2

10. /home – Home Directories

Home directories for all users to store their personal files. For example: /home/john, /home/nikita

11. /boot – Boot Loader Files

Contains boot loader related files. Kernel initrd, vmlinux, grub files are located under /boot For example: initrd.img-2.6.32-24-generic, vmlinuz-2.6.32-24-generic

Page 19: Operating project

OPERATING SYSTEM

12. /lib – System Libraries

Contains library files that supports the binaries located under /bin and /sbin Library filenames are either ld* or lib*.so.* For example: ld-2.11.1.so, libncurses.so.5.7

13. /opt – Optional add-on Applications

opt stands for optional. Contains add-on applications from individual vendors. add-on applications should be installed under either /opt/ or /opt/ sub-directory.

14. /mnt – Mount Directory

Temporary mount directory where sysadmins can mount filesystems.

15. /media – Removable Media Devices

Temporary mount directory for removable devices. For examples, /media/cdrom for CD-ROM; /media/floppy for floppy drives;

/media/cdrecorder for CD writer

16. /srv – Service Data

srv stands for service. Contains server specific services related data. For example, /srv/cvs contains CVS related data.

Page 20: Operating project

OPERATING SYSTEM

Kali Linux CommandsCommands Functionaspell Spell CheckerBg Send to backgroundbreak Exit from a loop Builtin  Run a shell builtin cal Display a calendar

cd Change Directory

chown Change file owner and group

cp Copy one or more files to another locationdate Display or change the date and timedc Desk Calculatordiff Display the differences between two filesdircolors Colour setup for `ls’exit Exit the shellfalse Do nothing, unsuccessfullyformat Format disks or tapes

 groupdel Delete a grouphistory Command History jobs List active jobs man Help manualtimes User and system timeswrite Send a message to another user rename Rename files rm Remove files

Page 21: Operating project

OPERATING SYSTEM

Conclusion

In this paper we have presented the Adaptive Domain Environment for Operating Systems as a solution for sharing hardware resources amongst multiple operating systems. We have presented its architecture and suggested an implementation method for the ix86 using Linux as the base OS. We have also defined areas of applicability. Although the implementation discussion has centered around on the ix86 using Linux, the concepts presented may be extended to other architectures and other base operating systems in order to provide the same capabilities.

Given the current state of the operating system market and the research field, Adios may be used to provide a bridge between both fields and promote the development of more flexible and cooperative operating systems. This would provide system administrators and programmers with the flexibility needed to develop user-friendly operating environments and applications that are not limited by the choice of a single operating system.

Page 22: Operating project

OPERATING SYSTEM

References:

https://www. kali .org/ https://en.wikipedia.org/wiki/ Kali _ Linux www.kalitut.com › Linux Commands https://www. kali .org/news/birth-of- kali / https://www.blackmoreops.com/2015/02/14/ linux -file-system-

hierarchy/ superuser.com/questions/752551/kali-where-do-installed-

programs-go https://www.offensive-security.com/metasploit.../modules-and-

locations/