![]() ![]() ![]() In this period, 2 weeks are focused to perform an operation called Merge Window, in which everything that has already been developed and approved is merged on the mainline tree. ![]() When you talk about Kernel you have to consider more variables and especially when this Kernel is linked to a distro dedicated to specific tasks.Ī new Linux kernel version is released approximately 10 to 12 weeks. The scope of my multiple tests is to verify the capability of this distro in the 3 main use cases to understand the affective potentialities of this Operating System and if is really suitable for professional use. The tests conducted on the videos below relate to 1) A session conducted on my workstation, 2) A session conducted inside a VMWare Virtual Machine Instance, 3) A session conducted by using my laptop. I've appreciated the presence of a complete code editor that is code-oss very useful, especially for lightweight debugging and security scripts and exploits coding without the need to install another programming ide. Despite my best efforts, I haven't been able to set up properly my professional wi-fi dongle which forced me to use a legacy device. My initial approach was focused to test the networking capabilities and the resource usage consumption of Kali Linux by conducting complete monitoring and security assessment session in which I was able to see that despite the I was using the everything metapackages distro ( 10 gigabytes of ISO image ) is not present in default the Realtek USB wifi driver for the wireless dongle, and this is not good for an Operating System born for pentesting with a lot of tools focused on wifi security. My target is to conduct an in-depth analysis by using unconventional methods totally different from the other tests so, I hope you enjoy watching the video and I hope you like it. Kali Linux is oriented to perform cybersecurity tasks but, as a professional cybersecurity expert, I've decided to evaluate personally this distro by using my personal methodology. Kali was associated with the popular culture thing especially because it was used inside popular movies and fiction during hacking sessions to perform different cyber attacks ( like for example nmap used for the first time inside the film "Matrix Reloaded" ). Kali Linux is the most popular "Security Oriented" Operating System ever, and, there is a reason for this success. Today I want to present you my Kali Linux review. Hello everyone, I'm Giacomo Ferrara representing Nemesys-Security.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |