Using Kali Linux Tools
Some of the tools in Kali Linux have been discussed in previous chapters of this book—including NMAP, Burp, Wireshark, Social Engineer Toolkit, and Metasploit Framework—but there are so many more. Here are some of my favorites out of hundreds that are extremely specialized but can be put in the following categories:
- Information gathering
- Maltego
- Recon‐ng
- Sparta
- Utilities
- MacChanger
- Nikto
- Wireless
- Kismet
- WiFite
- Brute forcing
- John the Ripper
- Hashcat
With these tools, you can test your computer system security using the same techniques that an attacker would. Kali Linux is specifically built to meet the requirements of security auditing and specifically geared toward security specialists. It is not a general‐purpose operating system and should be used only while working toward achieving your security requirements.
As you see in Figure 14.19, by clicking Applications in the upper‐left corner, the menu that drops down already breaks...