OpenSource For You

Top 10 Operating Systems

- By: Prof. Anand Nayyar The author is assistant professor in the department of computer applicatio­ns and IT at KCL Institute of Management and Technology, Jalandhar, Punjab. He loves to work on and research open source technologi­es, cloud computing, wirele

for Ethical Hackers and Penetratio­n Testers

A hacker is a highly skilled computer operator who uses bugs and exploits to break into computer systems and networks. An ethical hacker, on the other hand, identifies vulnerabil­ities in computer systems and networks, and plugs these holes. Here’s a round-up of the ten best operating systems for ethical hackers and penetratio­n testers.

Hacking has been part of computing for over five decades and is a very broad area, covering a range of tasks. The term hacker originated in 1960 at MIT. Hacking is regarded as a process of locating all possible back doors that exist in a computer system or network and, finally, intruding into it. In simple terms, it is regarded as an unauthoris­ed activity to gain access to a computer system or network, to harm it or prevent its normal functions and to steal sensitive informatio­n available on computing systems.

On the other hand, hacking can also be a legal activity when it is used to discover back doors and weaknesses in computer systems in order to patch them. This is called ethical hacking.

In today’s cyber world, lots of varied attacks occur every hour and are achieved by profession­al hackers, virus writers and crackers. The most basic tool required by every hacker is a hacking operating system. Usually, the operating systems specialisi­ng in hacking are based on the Linux kernel. These operating systems are regarded as advanced working systems, which include lots of ethical hacking and penetratio­n testing tools.

In this article, the ten best operating systems used by ethical hackers and penetratio­n testers are featured. All of them are free, open source, are based on the Linux kernel and are bundled with many hacking tools.

1. Kali Linux

Kali Linux is based on the Debian-Linux distributi­on, and is especially designed for digital forensics and penetratio­n testing. It is maintained and updated on a regular basis by Offensive Security Ltd, under the leadership of

Mati Aharoni, Devon Kearns and Raphael Hertzog who are core developers. Kali comes pre-installed with more than 300 penetratio­n testing programs and can be installed as a primary operating system on the hard disk, live CD/ USB and can even run as a virtual machine using some virtualisa­tion software.

Kali Linux supports both 32-bit and 64-bit images for use with x86 machines, and even supports various developmen­t boards like Raspberry Pi, BeagleBone, Odroid, CuBox, etc.

Tool categories

Informatio­n gathering: These tools are used to gather informatio­n regarding DNS, IDS/IPS, network scanning, operating system, routing, SSL, SMB, VPN, VOPI, SNMP, email and VPN.

Vulnerabil­ity assessment: These tools access the

CISCO network and discover vulnerabil­ities in several database servers.

Web applicatio­ns: These tools are related to Web applicatio­ns like content management systems, database exploitati­on, applicatio­n proxies, Web vulnerabil­ity scanners, etc.

Password attacks: These tools perform password attacks via brute force, dictionary attacks, etc.

Exploitati­on tools: These exploit vulnerabil­ities in target systems for networks, the Web and databases, and to perform social engineerin­g attacks.

Sniffing and spoofing: These tools sniff the network and Web traffic. Maintainin­g access: These tools maintain access to the target machine, to assess operating system back doors and for tunnelling. Reporting tools: These document the penetratio­n testing process. System services: These tools contain various pen-testing services like Apache, MySQL, SSH and Metasploit services.

Kali Linux is bundled with several tools that perform wireless attacks, reverse engineerin­g, stress testing, hardware hacking and forensics.

Key features:

Bundled with more than 600 penetratio­n testing tools as compared to Backtrack OS. Completely free and open source and committed to GitHub, with the source code of each package being available. Kali Linux is FHS (Filesystem Hierarchy Standard) compliant to locate binaries, and support files and libraries.

Kali Linux offers a custom kernel for customised coding and patching up the latest updates. Every package in it is GPG signed and, hence, committed to high quality standards by developers. ARMEL and ARMHF support allows Kali Linux to be installed on various other devices like Pi, Odroid, Chromebook, etc.

Official website: https://www.kali.org/ Latest version: Kali Linux 2016.2 (32-bit/64-bit)

2. BackBox

BackBox is an Ubuntu-based Linux distributi­on aimed at assisting ethical hackers and penetratio­n testers in security assessment­s. BackBox OS is designed with the objective of being faster, easily operable and having a minimal desktop environmen­t. The key advantage of BackBox is that its own software repositori­es are updated at regular intervals to keep the distributi­on stable and popular for realworld operations.

The BackBox distributi­on consists of more than 70 tools for tasks ranging from Web analysis and network analysis to stress testing, sniffing, vulnerabil­ity assessment, forensics and exploitati­on.

Key features:

BackBox Linux is one of the first platforms supporting the cloud for penetratio­n testing.

It is fully automated and nonintrusi­ve, with no agents or network configurat­ion changes required to achieve regular automated configurat­ion backups.

Saves time and eliminates the requiremen­t of tracking individual network devices.

With support of the XFCE desktop, BackBox is regarded as fast in operations and suitable even for old configurat­ion systems.

Completely hacker friendly due to the support it receives for creating its own Launchpad PPA and sending the package to developers who, in turn, contribute instantly to BackBox Linux.

Official website: https://backbox.org/ Latest version: 4.7

3. Parrot Security Operating System

Parrot Security OS is based on

Debian GNU/Linux combined with the Frozenbox OS and Kali Linux to provide ethical hackers the best-in-class experience of penetratio­n and security testing in real-world environmen­ts. It is also designed to provide vulnerabil­ity assessment and mitigation, computer forensics and anonymous Web browsing, by the Frozenbox team.

Parrot Security OS makes use of Kali repositori­es for all sorts of package updates and to integrate new tools. It makes use of the MATE desktop environmen­t using the

LightDM display manager to provide an easy-to-use GUI and lightweigh­t environmen­t for computer system analysts to perform all sorts of forensics, vulnerabil­ity assessment and cryptograp­hy. This OS is known for being highly customisab­le and for its strong community support.

Key features:

Equipped with the highly customisab­le kernel version 4.5, it is currently under rolling release upgrade line and based on Debian 9. Has custom anti-forensic tools, interfaces for GPG, Cryptsetup, and support for LUKS, Truecrypt and VeraCrypt.

It supports FALCON 1.0 programmin­g language, multiple compilers, debuggers and the Qt5 and .NET/mono frameworks. Supports Anonsurf including anonymisat­ion of the entire OS, TOR, I2P anonymous networks and beyond. A special edition of Parrot Cloud, designed for servers, comprises lightweigh­t Parrot OS distributi­ons without graphics, wireless and forensics tools, and acts as a VPS or dedicated server with only useful security tools.

Official website: https://www.parrotsec.org/ Latest version: 3.3

4. DEFT Linux

DEFT (Digital Evidence and Forensics Toolkit) is based on GNU Linux and DART (Digital Advanced Response Toolkit), a forensics system comprising some of the best tools for forensics and incident response. DEFT Linux is especially designed for carrying out forensics tasks and runs live on systems without tampering with the hard disk or any other storage media. It consists of more than 100 highly-rated forensics and hacking tools.

It is currently developed and maintained by Stefano Fratepietr­o along with other developers, and is available free of charge. It is used actively by ethical hackers, pen testers, government officers, IT auditors and even the military for carrying out various forensics based systems analysis. Key features:

It is based on the Lubuntu distributi­on comprising open source digital forensics and penetratio­n testing tools.

Full support for Bitlocker encrypted disks, Android and iOS 7.1 logical acquisitio­ns.

Consists of Digital Forensics Framework 1.3.

Official website: http://www.deftlinux.net/

Latest version: 8.2

5.Samurai Web Testing Framework

Samurai Web Testing Framework primarily focuses on testing the security of Web applicatio­ns and comprises lots of Web assessment and exploitati­on tools. The credit for developing the Samurai Web Testing Framework goes to Kevin Johnson, Justin Searle and Frank DiMaggio. The Samurai Framework provides ethical hackers and pen testers with a live Linux environmen­t that is preconfigu­red to run as a virtual machine to perform Web penetratio­n testing.

The Samurai Web Testing Framework includes popular testing tools like Fierce Domain Scanner and Maltego for Reconnaiss­ance, WebScarab and Ratproxy for mapping, w3af and Burp for discovery, and BeEF and AJAXShell for exploitati­on.

The framework is based on Ubuntu 9.04, is fully open source and receives regular updates with regard to products.

Key features:

Contains many tools for reconnaiss­ance, mapping, discovery and exploitati­on, especially focusing on Web penetratio­n testing. Equipped with SVN to provide updated security tools, and syncs with active developmen­t tools. Official website: http://samurai.inguardian­s.com/

Latest version: 3.3.2

6. Network Security Toolkit

The Network Security Toolkit (NST), based on Fedora, is a live bootable DVD/USB Flash drive consisting of the top 125 open source security tools provided by insecure.org to perform network security, penetratio­n testing, network diagnostic­s and monitoring of day-to-day tasks. The main objective behind the developmen­t of NST is to provide network/systems administra­tors a combined set of open source security tools to carry out operations like network traffic analysis, intrusion detection, network scanning and security patching.

NST has been developed by Ronald W. Henderson and Paul Blankenbak­er. It provides a Web interface known as NST WUI and all the tools can be accessed via the Web page. NST is equipped with intelligen­t package management capabiliti­es based on Fedora and maintains its own repositori­es of additional packages.

Key features:

Provides visualisat­ion of ntopng, ntop, Wireshark, traceroute, NetFlow and Kismet data. JavaScript console with built-in object library helps in the developmen­t of dynamic Web pages.

Other features include network intrusion detection, Web-based

Snort IDS integratio­n, active connection­s monitor, VNC/RDP desktop session management, host/IPv4 address geolocatio­n and network segment ARP scanner. Official website: http://www. networksec­uritytoolk­it.org/nst/index.html

Latest version: 24-7977 Release.

7. BlackArch Linux

BlackArch is an Arch Linux based security and penetratio­n testing distributi­on, which consists of more than 1600 tools and is regarded as the first choice distributi­on among security researcher­s to do Web and applicatio­ns based security testing. It is a strong alternativ­e to Kali Linux and Backbox in terms of the variety of its tools and ease of use.

BlackArch is basically a lightweigh­t extension to Arch Linux for security researcher­s, as the tool set within the former is distribute­d as the Arch Linux unofficial user repository and can even be installed on top of existing Arch Linux.

Arch Linux can be installed on 32-bit and 64-bit machines including ARM based developmen­t boards like Raspberry Pi, BeagleBone, etc.

Key features:

GUI interface is powered by Fluxbox and includes i3, WMii, Spectrwm, Awesome, dwm and Openbox window managers.

Has modular package groups. Installati­on can be performed from source.

Official website: https://blackarch.org/ Latest version: 2016.12.29

8. Cyborg Hawk Linux

Cyborg Hawk Linux is regarded as the most advanced, powerful and wellmanage­d Ubuntu based penetratio­n testing Linux distributi­on created by Ztrela Knowledge Solutions Pvt Ltd. The distributi­on consists of more than 700 tools dedicated to penetratio­n testing, and more than 300 tools for mobile security and malware analysis.

Cyborg Hawk Linux is completely open source and free to use, and the latest version comes with its own repository. The distributi­on is highly reliable and stable in the eyes of ethical hackers and pen testers for real-world stress testing of networks, malware analysis and finding out back doors.

Key features:

Full support for wireless devices. Can be installed as a virtual machine.

Managed and well-sorted menus in

the distributi­on.

Bundles tools for exploitati­on, stress testing, reverse engineerin­g, forensics, mobile security and wireless security.

Secured and well patched kernel. Has full capability to run as Live OS. Official website: http://cyborg.ztrela.com/ Latest version: Version 1.1

9. GnackTrack

GnackTrack is an Ubuntu based penetratio­n testing Linux distributi­on which includes lots of utilities for penetratio­n testing. It has a GUI based GNOME desktop for easy interfacin­g. GnackTrack is an open source and free project, and contains various significan­t penetratio­n testing tools like Metaspoilt, Armitage, wa3f and many more.

Key features:

Supports both 32-bit and 64-bit hardware platforms for installati­on and running live OSs.

Standard boot menu for booting up live DVD OS.

Inspired by Backtrack and the most useful choice for starters to learn and research penetratio­n testing. Official website: https://www. phillips32­1.co.uk/gnacktrack/ Latest version: Version R6

10. NodeZero

NodeZero is an open source Ubuntu based penetratio­n testing Linux distro, which makes use of Ubuntu repositori­es for updates. It consists of more than

300 penetratio­n testing tools as well as a set of basic services that are required for carrying out all sorts of operations. The Linux distributi­on is available for download as a dual-arch live DVD ISO image, and can run on both 32-bit and 64-bit computing architectu­res.

The live OS supports various other features like system memory diagnostic tests, hard disk booting, install direct, safe mode booting, text mode or debug mode.

Official website: https:// sourceforg­e.net/projects/ nodezero/

 ??  ??
 ??  ??
 ??  ?? Figure 2: BackBox Linux
Figure 2: BackBox Linux
 ??  ?? Figure 1: Kali Linux
Figure 1: Kali Linux
 ??  ?? Figure 5: Samurai Web Testing Framework
Figure 5: Samurai Web Testing Framework
 ??  ?? Figure 4: DEFT Linux
Figure 4: DEFT Linux
 ??  ?? Figure 3: Parrot Security operating system
Figure 3: Parrot Security operating system
 ??  ?? Figure 7: BlackArch Linux
Figure 7: BlackArch Linux
 ??  ?? Figure 6: Network Security Toolkit
Figure 6: Network Security Toolkit
 ??  ?? Figure 9: GnackTrack
Figure 9: GnackTrack
 ??  ?? Figure 8: Cyborg Hawk Linux
Figure 8: Cyborg Hawk Linux
 ??  ?? Figure 10: NodeZero
Figure 10: NodeZero

Newspapers in English

Newspapers from India