未加星标

Top 5 Penetration Testing Linux Distributions

字体大小 | |
[系统(linux) 所属分类 系统(linux) | 发布者 店小二05 | 时间 2016 | 作者 红领巾 ] 0人收藏点击收藏

Top 5 Penetration Testing Linux Distributions

There are a seemingly endless amount oflinux distros for just about every area of use. This includes pen testing, sometimes called hacking, distros. Some of you are undoubtedly familiar with, at least if you have spent any time looking around at all the distributions out there.

What follows is this humble author's personal top five list of Linux distributions for hacking. I will ad that this my list, based off of my personal experiences. Not everyone is going to agree, and that is fine. In fact it is the point. The beauty of Linux is that has the personal in mind. Made for the individual, not the assembly line.

With that in mind let’s go ahead and dive in. If you have any disagreement or would simply like to add input, maybe start a discussion on it, leave a few comments. Or, better yet, drop a line at

realfquarry at gmail dot com

. Happy to talk about all of it Here we go!

5. Tails

The Amnesiac Incognito Live System. Its primary use is complete anonymity. For the overly cautious individuals that derogatorily called paranoid, this is gem. Its most obvious feature, from which it draws its name, is that it lacks any persistency. Basically it deletes literally everything on it when it gets shut down. That seems pointless at first but if for some reason you maybe feel compromised being able to wipe out everything right away is nice.


Top 5 Penetration Testing Linux Distributions

It lacks any relevant tools for real pentesting purposes but, you can download these and use them later. This would be a bit of a pain but if you are all about the secrecy then this all you. I mostly use it for preliminary recon and some dark web diving, this can be important for info gathering on information you may not already have. Outside of that though there are not many uses.

CAUTION: USE IN A VM. This allows you to save the machine state and not lose anything right away. Plus, should something go wrong at all you can just shut it down and boom all of it is gone.

4. Ubuntu

What? Ubuntu? For hacking? It’s just a general purpose, basic flavor of Linux.

Yes, that is very true. But that is kind of the point. Many of the top pen testing focused distributions on the web are very heavily loaded with tools and so on. That is not always a bad thing but it is not always a good thing either. After all, the average user is only going to use some of those tools. Especially because many of the tools do the same thing and everyone has a favorite.


Top 5 Penetration Testing Linux Distributions

Using Ubuntu allows you to add only the tools and applications you want to use and not any of the others. Plus it is extremely intuitive to use, particularly if you have been using it for awhile already. The downside is that you will have to download all these applications and tools on your own and that can suck. As well as being time consuming. Plus it is where most people do all there every day work, which can be a dangerous, should you get back hacked or anything else.

3. Fedora Security Spin

This lovely product is made by Fedora, part of Red Hat, Linus Torvalds’ favorite companies. It is not an operating system made purely for the hacker and security pros like the last two on this list. Instead it is made with an educational bend in mind.


Top 5 Penetration Testing Linux Distributions

It is made for students and teachers and expand knowledge, something I am a big fan of. I know how tough it can be to learn on your own. This helps with that big time. And I love that. Now it might not offer every little tool but it should still cover quite a bit. And if you are looking to learn or teach others this is a great place to start. One downside for me as well is that it is Fedora. Nothing personal, just never felt super comfortable with Red Hat-Fedora products, but that is just me.

2. BackBox

This is a great tool and comes very close to being my number one. It is loaded down with some great tools and is a Ubuntu based system. For the many users who started on Ubuntu, which is most, this is a big deal. It was a big deal for me to. The truth is that I started on Kali and have stuck with it. Simple as that.


Top 5 Penetration Testing Linux Distributions

Much like many hack/pen test operating systems it can be a tad over the top with all the tools it uses. But that can also be a part of its appeal. Plus the popularity it has means it comes with a great community.

1. Kali Linux

The grand master of hacking and pen testing distributions. If you have done a lot of research Kali Linux has almost certainly come up and it was probably at the top of more than a few lists. Why? Cause it really that good. It has pretty much everything you could want, although not all of it. Metasploit framework, check. Bursuite, check. Crack-ng, check. A bunch of other things I have never heard of until I first used Kali check.

Kali 2.0 Teaser - Kali Sana! from Offensive Security on Vimeo .

As previously mentioned you will not really be using all the tools on here. There is a lot of redundancy and using one password cracker over the other is kind of pointless unless it works better or it simply feels more comfortable for you. Personally I would rather have to many then not enough. Not everyone is that way of course. Using Kali guarantees your bases are covered and that you will be using a proven tool that pros across the private and public sectors love. This provides a strong community to learn from.

Conclusion

Do lots of research and try all the OSes you can. Get to know what you like and you will feel better going in. Also, research and use VMs, they are great tools to use in pen testing and provide some security. Lastly, look up the AZ Cyber Warfare Range, it is a great tool for education providing several ranges to learn and hone your skills at. Until next time, have a great day, KCCO!!

本文系统(linux)相关术语:linux系统 鸟哥的linux私房菜 linux命令大全 linux操作系统

主题: LinuxUbuntuAUTUTAUTI
分页:12
转载请注明
本文标题:Top 5 Penetration Testing Linux Distributions
本站链接:http://www.codesec.net/view/483390.html
分享请点击:


1.凡CodeSecTeam转载的文章,均出自其它媒体或其他官网介绍,目的在于传递更多的信息,并不代表本站赞同其观点和其真实性负责;
2.转载的文章仅代表原创作者观点,与本站无关。其原创性以及文中陈述文字和内容未经本站证实,本站对该文以及其中全部或者部分内容、文字的真实性、完整性、及时性,不作出任何保证或承若;
3.如本站转载稿涉及版权等问题,请作者及时联系本站,我们会及时处理。
登录后可拥有收藏文章、关注作者等权限...
技术大类 技术大类 | 系统(linux) | 评论(0) | 阅读(37)