Linux Distribution based on security, privacy and penetration Essay

Introduction

Developed by Linus Torvalds on September 17, 1991, at the University of Helsinki in Finland, based on Linux Kernel it is an open-source operating system that hacks secured data (Cmu.edu, 2020). Officially, the first-ever version to be released was Linux 0.02. It’s developed under GNU License which allows it to be distributed freely.

Top 3 Linux Distros based on security, privacy and penetration

KaliLinux

Derived from Devian distro, Kali Linux found its use in auditing, forensic, security and network. The Metasploit framework is a very dominant tool which is basically used by cybercrimes as well as hackers to probe methodical susceptibility on servers and networks. It is a framework which can be operated with every operating system and it is also an open-source framework which can be easily personalized. Kismet wireless is a system which detects sniffers, and intrusion the secured data. This system helps to hack personal information.  Nikto2 is an open-source server scanner which executes thorough investigation against web servers for numerous items. It checks around 6700 potentially precarious files or programs, analyzes for an antiquated rendition of over 1250 servers and renders precise problems on over 270 servers (Kali.org, 2020). This server also keeps detailed information about numerous index files, HTTP server options and can also spot out the installed software.

Parrot Security OS

Parrot Security OS is derived from Debian distro and it focuses on security and privacy. Based on Debian’s Bullseye with Linux Kernel 5.5, it follows a rolling-release development model. Out of all editions, Parrot Security provides a suite of penetration testing tools which can be used for attack mitigation, forensics, security research and vulnerability assessment (Hooper et al 2016). Anonsurf is a tool TOR, I2P or other anonymizing networks for operating system communication. Accordingly, there is software named as GPA which utilizes OpenPGP, which is used to encrypt and decrypt the files, emails and documents. SQLmap automatically exploits and detects secured data. It executes arbitrary commands and retrieves their standard output on the database server. It can also disclose data from several databases. It also helps in cracking the password by performing dictionary-based attacks.

BlackArch

Based on Arch distro, it provides an array of tools for penetration testing and security researchers with a high-performance ruby framework which is also modular named as Arachni (Cisar and Pinter, 2019). It basically focused on helping the testers of penetration and organizer appraise the surveillance of web applications. It has an integrated browser environment which makes supporting highly complicated web applications easy. Tor Router uses TOR as a browser which never discloses the identity online. The usage of the TOR network also anonymizes web traffic. It is also a slower network as compared to clearnet.

Conclusion

Typically whenever a person says that he is using Linux, he/she means they are using Linux Distribution.  A Linux distribution is a package which has the kernel and other supporting operating system software provided by GNU Project.

 

 

List Of All Assignment Help Provided By BestAssignmentExperts

Finance Assignment Help                                Law Assignment Help                               IT Assignment Help                              
Essay Help Marketing Assignment Help Management Assignment Help
Science Assignment Help Biology Assignment Help Statistics Assignment Help
 

 

References

Cisar, P. and Pinter, R., 2019. Some ethical hacking possibilities in Kali Linux environment. Journal of Applied Technical and Educational Sciences, 9(4), pp.129-149.

Cmu.edu, (2020) LINUX Available at https://www.cs.cmu.edu/~awb/linux.history.html Accessed on 27th May 2020

Hooper, M., Tian, Y., Zhou, R., Cao, B., Lauf, A.P., Watkins, L., Robinson, W.H. and Alexis, W., 2016, November. Securing commercial wifi-based uavs from common security attacks. In MILCOM 2016-2016 IEEE Military Communications Conference (pp. 1213-1218). IEEE

Kali.org, (2020) KALITOOLS Available at https://tools.kali.org/information-gathering/nikto Accessed on 27th May 2020

No Need To Pay Extra
  • Turnitin Report

    $10.00
  • Proofreading and Editing

    $9.00
    Per Page
  • Consultation with Expert

    $35.00
    Per Hour
  • Live Session 1-on-1

    $40.00
    Per 30 min.
  • Quality Check

    $25.00
  • Total

    Free

New Special Offer

Get 25% Off

best-assignment-experts-review

Call Back