1 00:00:13,340 --> 00:00:16,830 Let us start with a new lecture in this lecture. 2 00:00:17,150 --> 00:00:20,330 We are going to see what is called Linux. 3 00:00:21,140 --> 00:00:24,820 Karley Linux is a Debian based Linux distribution. 4 00:00:25,430 --> 00:00:31,980 It is a meticulously crafted OS that specifically caters to the likes of network analysts and protesters. 5 00:00:32,630 --> 00:00:39,290 The presence of a plethora of tools that come preinstalled with the culley transforms it into an ethical 6 00:00:39,290 --> 00:00:40,550 hackers system. 7 00:00:40,550 --> 00:00:44,300 I've previously known as Backtrack Garley. 8 00:00:44,300 --> 00:00:50,570 Linux advertises itself as a more polished successor but more testing centric tools. 9 00:00:51,470 --> 00:00:55,220 Clarinex makes ethical hacking a simplified task. 10 00:00:55,940 --> 00:01:01,460 It is more than 800 tools and metal packages for almost all the steps involved in hacking. 11 00:01:01,760 --> 00:01:08,060 It is categorized all the tools like information gathering, vulnerability analysis, wireless attacks, 12 00:01:08,300 --> 00:01:15,050 exploitation tools, forensic tools, sniffing and spoofing password attacks, reverse engineering, 13 00:01:15,290 --> 00:01:20,150 hardworking RFID tools, VOA IP tools and many more. 14 00:01:20,480 --> 00:01:25,520 Unmap Wireshark Beef Revoyr Social Engineering Toolkit. 15 00:01:25,940 --> 00:01:33,140 The ETSI Hydra aircraft engy metal serpent testing software are some frequently used applications which 16 00:01:33,140 --> 00:01:43,340 play vital roles in different jobs and run Natally or Budler from a Lousily or Leive USB or within a 17 00:01:43,340 --> 00:01:44,180 virtual machine. 18 00:01:44,450 --> 00:01:50,210 Based on Debian most packages, Kaliya users are imported from the Debian repositories. 19 00:01:50,600 --> 00:01:58,250 There are a wide array of reasons, as you should know why to use the Clarinex Linux has been and will 20 00:01:58,250 --> 00:01:59,720 always be free to use. 21 00:02:00,760 --> 00:02:08,170 Kylie Lennox comes with over 600 different brand testing and security analytics tools, Kylie, being 22 00:02:08,170 --> 00:02:12,760 a member of the next family, follows the widely appreciated open source model. 23 00:02:13,210 --> 00:02:19,500 Their development is publicly visible on the gate and all the code is available for working purposes. 24 00:02:19,870 --> 00:02:26,010 Although when testing tools tend to be written in English, it has been ensured that Kylie includes 25 00:02:26,020 --> 00:02:31,780 true multilingual support, allowing more users to operate in their native language and look at the 26 00:02:31,780 --> 00:02:33,210 tools, the need for the job. 27 00:02:34,030 --> 00:02:39,700 The developers are often to security, understand that not everyone will agree with their design model. 28 00:02:39,880 --> 00:02:46,660 So they have made it easy as possible for more adventurous user customers Kylie Linux to their liking 29 00:02:46,930 --> 00:02:48,670 all the way down to the kernel. 30 00:02:48,880 --> 00:02:57,090 So I hope you've got a complete idea why security professionals prefer Kylie Linux for hacking and Benediktsson 31 00:02:57,100 --> 00:02:57,760 purposes. 32 00:02:58,210 --> 00:03:03,310 In the upcoming lectures, we will use Linux for all the phases of hacking. 33 00:03:03,820 --> 00:03:09,280 In the next lecture, we will see how to download and install a virtual box.