If you don’t have an in-depth understanding of security mechanisms, this OS would be totally useless for you. Unlike Kali Linux or Tsurugi, DEFT is foolproof: not a single tool can be launched without proper precautions. Accordingly, an important advantage of DEFT is competitive intelligence, including the analysis of interrelations between social media accounts.ĭEFT even includes a utility detecting geolocation of LinkedIn and Twitter accounts it effectively identifies the home country and city for an account. Initially, this distribution was developed for the network police and IS incident response specialists. The main toolkit is located in the DEFT folder accessible in the Run menu. The OS gives you access to erased, encrypted, or corrupted data stored on various media types. The product offers all kinds of essential utilities: from antiviruses, systems retrieving information from the browser cache, and network scanners to specialized tools required when you search for hidden information on a hard drive. Overall, the system, resembles a Swiss Army knife – elegant and extremely useful.ĭEFT is based on Lubuntu and features a handy graphical interface. Furthermore, these tools are harmoniously built into it. DEFTĬreated in sunny Italy, DEFT features a broad range of reconnaissance and hacking tools. The final verdict is: Kali is a great tool if you know how to use it, but never give it to children. Kali runs in WSLįor greater convenience, the official website offers a distribution for virtual machines – it’s much safer to use for hacking purposes a system without installation: you never know who may dig in your computer later… It is also necessary to note that Kali distributions include plenty of wordlists suitable for attacks targeting not only Wi-Fi, but Internet accounts and network services as well. Still, its kernel and majority of tools supplied with Kali are designed for hacking Wi-Fi systems. It includes Metasploit framework and hence can be used for pentesting of remote hosts. A successor to BackTrack, Kali is well adapted to interaction with wireless communication channels, especially Wi-Fi. Kali is designed for a wide range of tasks, but its primary purposes are attacks in the network environment, identification of vulnerabilities in web applications, and gaining access to wireless networks. More than 600 official and unofficial utilities are included in this distribution, and new modules, frameworks, and other features are released on a regular basis. In skilled hands, Kali is a powerful tool, but it must be kept out of the reach of children. Many features you need in everyday life are not present in Kali, and an attempt to install them may cause malfunctions in the OS or even make it inoperative. From its core to shell, Kali was created and optimized for combat missions on information security fronts, and it’s poorly suited for regular daily operation. Experience shows that not all users understand how risky it is to make this system the main OS. Furthermore, some of these tools don’t work properly out of the box (or don’t work at all). One of its main advantages is accessibility, but frankly speaking, the system is slightly overloaded with various tools (not as much as BlackArch, but still). Even schoolchildren know about it, and it’s available as an app in Microsoft Store. KaliĪs you are well aware, Kali is one of the most popular hacking distributions. Overall, this distribution can be recommended to old-school hackers nostalgic for an ancient interface and familiar tools. The netwag package offers a good assortment of spoofing and scanning modules, and it’s still pretty efficient (although not very handy and terribly obsolete).Īll the tested programs run smoothly. Most utilities are stored in the Applications → Internet folder, including Java-based Angry IP Scanner, Ettercap, end even OWASP ZAP, addressed in one of our earlier articles. The majority of utilities are stored in the Internet folder Too bad, some useful components are missing, for instance masscan and aircrack (although airsnort is present). The pentesting set includes several dozen of most important tools: network scanners, clients for all kinds of services, and various traffic interceptors. The MATE-based graphical interface reminds of the goodie-oldie 2000s. NST is based on Fedora and primarily designed for network attacks. The NST (Network Security Toolkit) distribution is not very well-known, but it definitely deserves your attention.
Remember that improper use of pentesting software is punishable by law. The primary purpose of these Linux distributions is pentesting, and you are solely responsible for their practical application.