You are on page 1of 19

operating system

By Student
Muhammed Luqman Mustafa
Supervisor
Mr.Naji Abdullah majedkhan

2019 - 2020

0
dAcknowledgements
My first and greatest thanks are to Allah. He above all was, is, and will be the
source of help and guidance that counts. Next, i would like to express my deep
gratitude to my supervisor “Mr.Naji Abdullah majedkhan” for him effort and
encouragement throughout the preparation of this report. His Knowledge and
endless support was a great asset from which i learned plenty. He was very
enthusiastic about the report, which gave me a motive to work harder and harder

Contents
Introduction................................................................................................................2
1.1 Linux..............................................................................................................2
1.2 What is Kali Linux?.......................................................................................2
1.3 What is Kali Linux used for ?........................................................................2
1.4 Should you use Kali Linux?..........................................................................2
1.5 Why Kali Linux is used?...............................................................................3
1.6 How to install Kali Linux?............................................................................4
1.7 Requiremant..................................................................................................4
1.8 Development..................................................................................................4
1.9 Some special Kali Linux Features of note.....................................................5
 Full Customisation of Kali ISOs................................................................5
 Kali Linux ISO of Doom and Other Kali Recipes.....................................5
 Kali Linux Live USB with LUKS Encrypted Persistence.........................5
 Kali Linux Live USB with Multiple Persistence Stores.............................5
 Kali Linux Full Disk Encryption................................................................5
 Disk Encryption on Raspberry Pi 2............................................................5
 Kali Linux NetHunter.................................................................................5
 Kali Linux Running on Android................................................................5
1
1.10 What are the disadvantages of Kali Linux?................................................6
1.11 Disadvantages of Kali Linux ?...................................................................6
What is Unix?.............................................................................................................8
1.12 What is Unix made for ?.............................................................................8
1.13 Unix consists of three main parts; Kernel kernel, shell and software
programs.................................................................................................................8
1- The Kernel Kernel The Unix kernel is the hub of the operating system and
the main medium between it and the rest of the devices; It allocates time and
memory for programs, manages files and controls device and networks in
response to system commands...............................................................................8
1.14 Salient Features of Unix.............................................................................9
1.15 Unix Features.............................................................................................9
1.16 Disadvantages of Unix.............................................................................10
1.17 Unix uses..................................................................................................10
1.18 Ten Essential Unix...................................................................................11
........................................................................................................................12
Linux Vs. Unix:........................................................................................................13
1.19 What's the Difference?.............................................................................13
1.20 Development............................................................................................14
 Unix: The Ordered Approach...................................................................14
 Linux: Unix Meets Anarchy.....................................................................15
1.21 Philosophy................................................................................................15
 Unix..........................................................................................................16
 Linux........................................................................................................16
1.22 Software And Utilities..............................................................................17
1.23 Conclusion................................................................................................17

2
Introduction
Computer operating systems can be defined as basic programs in the computer that
do not work without them, as all applications that install on the computer work, and
users can interact directly with the operating system through a user interface such
as the command line or the graphical user interface (GUI), and the systems differ.
Operating in terms of the number of users, they are either single-use or multi-users,
as they differ in terms of the number of programs.

1.1 Linux
1.2 What is Kali Linux?
Kali Linux is a Debian-based Linux distribution aimed at advanced Penetration
Testing and Security Auditing. Kali contains several hundred tools which are
geared towards various information security tasks, such as Penetration Testing,
Security research, Computer Forensics and Reverse Engineering. Kali Linux is
developed, funded and maintained by Offensive Security, a leading information
security training company.(1)

1.3 What is Kali Linux used for ?


Kali Linux is a Debian-based Linux distribution aimed at advanced Penetration
Testing and Security Auditing. Kali contains several hundred tools which are
geared towards various information security tasks, such as Penetration Testing,
Security research, Computer Forensics and Reverse Engineering.

1.4 Should you use Kali Linux?


Kali Linux is used for advanced and professional people. If you take support of
internet to doing any work then Kali Linux is not suitable for you. The official
statement of Kali Linux is "Penetration Testing, and Ethical Hacking Linux

3
Distribution.” Even sometime professional people get confuse while using it. 
The use of Kali Linux is very dangerous, and it should be performed very carefully.
In case if you got hacked then you can be lost all of your data and may be exposed
to widget audience. Some professional also refuse to use this Kali Linux. 

I prefer If you are not an expert then you should not use Kali Linux to put your life
in danger. , So that's all about what is Kali Linux ? Uses, Advantages, and
disadvantages, and Kali Linux. 
Hopefully you understand what you wanted to know about Kali Linux. If you
enjoyed reading the article and you if you think that this article is helpful then
please don't forget to share your opinion on the comment section and also please
don't forget to share this with your friends. Thank you! Have a great day ahead of
you.

1.5 Why Kali Linux is used?


So, I have already told that hacker is used Kali Linux for hacking purpose. If
you want to hack someone's website or want to know any other informations
about them, then you must have to make some tool about what you want to
know in those sites.
 If you want to do these things with any other operating system then you
have to write a long paragraph of code which may be impossible for you. For
example- suppose you trying to attack a virus attack to particular website
then you must have to make a tool about virus attack, and for that you have
to write a long code. In that case Kali Linux uses to get those tool easily.
Because, in Kali Linux there is already present different categories of ready
made tools by experts. You can easily use those tool according to what type
of attack you wanted to do. That's why Kali Linux acts as a Paradise for

4
hackers in the world of hacking.
 By the use of Kali Linux you can test penetration of any website, you can
check security system, or you can get information about that site.

1.6 How to install Kali Linux?


Kali Linux is a computer based operating system, and it can be easily
installed from internet. The installation process is exactly same with the
other operating system. The way you install windows the process is also
same with those. Just you have to choose an Encrypted LVM partition during
the installation process.
 To install Kali Linux in your system first you have downloaded it's ISO file.
The official link of this OS is provided here.

1.7 Requiremant
Kali Linux requires a minimum of 3GB hard disk space for installation.[17]

A minimum of 256MB RAM for i386 and AMD64 architectures.

A bootable CD-DVD drive or a USB stick.

1.8 Development
Kali Linux has over 600 preinstalled penetration-testing programs, including
Armitage (a graphical cyber attack management tool), Nmap (a port scanner),
Wireshark (a packet analyzer), John the Ripper (a password cracker), Aircrack-ng
(a software suite for penetration-testing wireless LANs), Burp suite and OWASP
ZAP web application security scanners

It was developed by Mati Aharoni and Devon Kearns of Offensive Security


through the rewrite of BackTrack, their previous information security testing Linux

5
distribution based on Knoppix. Originally, it was designed with a focus on kernel
auditing, from which it got its name Kernel Auditing LInux. The name is
sometimes incorrectly assumed to come from Kali the Hindu goddess.The third
core developer, Raphaël Hertzog, joined them as a Debian expert.

Kali Linux is based on the Debian Testing branch. Most packages Kali uses are
imported from the Debian repositories

Kali Linux popularity grew when it was featured in multiple episodes of the TV
series Mr. Robot. Tools highlighted in the show and provided by Kali Linux
include Bluesniff, Bluetooth Scanner (btscanner), John the Ripper, Metasploit
Framework, nmap, Shellshock, and Wget.

1.9 Some special Kali Linux Features of note


▪ Full Customisation of Kali ISOs
▪ Kali Linux ISO of Doom and Other Kali Recipes
▪ Kali Linux Live USB with LUKS Encrypted Persistence
▪ Kali Linux Live USB with Multiple Persistence Stores
▪ Kali Linux Full Disk Encryption
▪ Disk Encryption on Raspberry Pi 2
▪ Kali Linux NetHunter
▪ Kali Linux Running on Android

6
1.10 What are the disadvantages of Kali Linux?
Let's have a look on some advantages of Kali Linux.

• In Kali Linux there are 600 + Super advanced penetration testing tools


already been pre loaded.

• Kali Linux system is completely free. It provides life time service to the
users.

• It is completely openly sourced system which can easily be access by the


users.

• In Kali Linux File-system Hierarchy Standard has been used by which


users can easily locates the binaries. 

• In spite of English Kali allows to support many other languages.

1.11 Disadvantages of Kali Linux ?


As we all know that Kali Linux operating system have lots of advantages but it
have also some disadvantages too. By which users can be faced some unexpected
problems. Some cons of Kali Linux are —

 • It makes the system slower.

• The system can get easily corrupted.

7
• Some softwares may not be functioned well .

• KALI is not as easy to use because it’s penetration oriented

8
What is Unix?
It is a portable multi-tasking and multi-user operating system, was developed in the
seventies of the last century and was one of the first operating systems written in
the language of c, Developed based on the philosophy that the strength of the
system comes from the relationships between programs, not from the programs
themselves, and Unix programs are designed to do something One works well, the
other software is designed to work together, and this makes Unix simple with a
clear, easy-to-use interface. These qualities have made the Unix environment an
essential component in the development of the Internet and communication
technologies, and thanks to its many features it is widely used in computers, servers
and mobile devices.

1.12 What is Unix made for ?


1.13 Unix consists of three main parts; Kernel kernel, shell and
software programs
1- The Kernel Kernel
The Unix kernel is the hub of the operating system and the
main medium between it and the rest of the devices; It allocates
time and memory for programs, manages files and controls
device and networks in response to system commands.
Shell
The shell acts as an interface between the user and the kernel; When the user logs
in, the login program checks the username and password, then the shell program
starts working, which is a command line interpreter (CLI); Where he interprets the
orders and arranges them to be executed, and these orders are the software that

9
makes up the system. When you finish executing the command, the shell enables
you to give another command

1.14 Salient Features of Unix

There are several prominent features of Unix, and few among them are stated below:- (4)

1- It is a multi-user system where the same resources can be shared by different users.

2- It provides multi-tasking, wherein each user can execute many processes at the same time.

3- It was the first operating system that was written in a high-level language (C Language).
This made it easy to port to other machines with minimum adaptations.

4- It provides a hierarchical file structure which allows easier access and maintenance of
data.

5- Unix has built-in networking functions so that different users can easily exchange
information.

Unix functionality can be extended through user programs built on a standard


programming interface.

1.15 Unix Features

There are many features that make you use unix and prefer it over others in many cases, the most
important of these are:

 Portable operating system : It can be used on personal computers and


MAC devices, and it is named portable for use on various platforms by all
users.

10
 Perform complex tasks : UNIX is one of the few operating systems that
allow you to perform complex tasks with ease, with minimal resource use.
 Minimum memory usage : UNIX is designed to perform complex tasks
and resource use without a defect, with minimal physical memory usage.
 Simple design : UNIX focuses on simplicity and components that work
constantly, and if it fails for some reason then there will be specific reasons
for the reason for failure.
 Transparency and scalability : This means that in many cases UNIX
provides the full readable source code or even changes as needed by different
programs available to users. Unix programs and operating system
components also often come with comprehensive digital manuals that
facilitate the handling of the system

1.16 Disadvantages of Unix


Although UNIX is efficient at performing complex tasks, it is not without
drawbacks, these negatives are concentrated in the following points.

 It depends on the command line : it is designed primarily for programmers


who know the commands well, which means that the command will be
completely different for novice users, a graphical user interface (GUI) was
recently launched, but despite that, the traditional interface is only found in
the command line form.
 Encrypted Commands: Commands contain encrypted names, which do not
guide the user during its activities, and most commands used in UNIX
require the use of special characters, which makes it very difficult for
ordinary users to deal with the operating system

11
1.17 Unix uses

UNIX can provide you with a stable and secure system for running advanced web applications,
which is the main reason why the internet is what it is today, and because of its way of work it is
considered the most prominent uses in the internet and its applications, web servers, DNS servers
and automatic host configuration protocol (DHCP).3

As mentioned above; Few users interact with UNIX, although it is a powerful system and has
wide and useful uses, but it needs experience in dealing with it, and this defines its users with a
small category

The Directory Structure (5)

1.18 Ten Essential Unix

12
These are ten commands that you really need to know in order to get started with
UNIX. They are probably similar to commands you already know for another
operating system.

13
Linux Vs. Unix:
Linux and Unix are often compared to each other. If the similarity in their names
wasn't enough, Linux is technically a descendant of Unix, and they share a number
of similarities in tool kits and overall structure. They aren't exactly the same,
though, and the approaches and philosophies behind them are radically different.

1.19 What's the Difference?


Unix

Unix started out as a research project at Bell Labs in the mid 1970's where it was initially
developed for research purposes on Bell's PDP-11 computers. As the C programming language
was also being developed by primary Unix developers, Ken Thompson and Dennis Ritchie, they
began converting the Unix source code to C, making it one of the first portable operating
systems. That means that Unix, unlike many other computer operating systems of the era, could
be used on multiple different computers.

It didn't take long for educational institutions, including top universities, to see the merit in Unix.
They began adopting it both for their own mainframe systems and as a teaching tool for their
computer science programs. Bell licensed Unix and its source code to these universities, leading
to a whole generation of developers who learned on Unix, and making it the primary choice in
both academic and business settings.

Over time, Unix swelled in popularity, and other major players began developing their own
versions of Unix, including HP-UX, Solaris, AIX, and the Berkeley Software Distribution(BSD).
During the 1980's and early 1990's Unix was everywhere, and it dominated the infrastructure
powering most major businesses. Unix did make it into the home, too. Apple's Mac OS is based
on its own version of Unix, Darwin.

14
Linux

In 1991, a computer science student at the University of Helsinki named Linus Torvalds grew
frustrated with the restrictive licensing of MINIX, another operating system descended from
Unix. In response, he decided to replicate the functionality of MINIX in his own Unix-like
operating system kernel. That kernel later became Linux.

Torvalds decided to release his kernel under the GNU GPL free software license and distribute it
on a young internet for collaboration and improvement. His decision would shape the way Linux
is developed to this day and give rise to the Linux distribution.

Originally, Linux was used and built with the MINIX utilities, but for licensing reasons, it
became clear that Linux needed its own set of utilities. That's when a natural match was made.

Earlier, in 1983, a researcher at MIT, Richard Stallman, decided to replicate Unix and release it
under free software licenses for everyone to be able to use. He called his project GNU, or GNU's
Not Unix. In 1991, when Torvalds was looking for an ecosystem for his kernel, GNU had all the
necessary utilities for an operating system, except the kernel. Pairing the two to form the modern
Linux operating system, GNU/Linux, was a no-brainer.

From there, developers began pairing the Linux kernel with their own collections of software
from the GNU project and other compatible sources. These software distributions were each their
own fully functional operating system, built around the Linux kernel. It wasn't long before
corporate players began getting involved with this inexpensive replacement to the license
encumbered Unix, with some developing their own distributions.

1.20 Development
You can probably see from here that the origins of each operating system dictated
who was developing each and how.

15
▪ Unix: The Ordered Approach

Unix was a commercial product, and there are still commercial versions of Unix out there. They
are developed by a single corporate entity internally and released in accordance with the
corporations scheduling and deadlines.

The BSDs are open source Unix operating systems that, although released freely, are still
developed in a more ordered way. The core of BSD and its core utilities are all handled by the
same developers. They're finely tuned to all work in accordance with each other, and the system
isn't released until everything's ready. Then, the other BSD distributions go and put their own
spin out the outer parts of the system. The result is a much more controlled and measured system.

▪ Linux: Unix Meets Anarchy

Linux is pretty much the exact opposite of Unix. Everything about Linux is chaos. The Linux
kernel is overseen by a core group of developers employed by the Linux foundation, but they
receive literally thousands of code submissions from independent developers and large
corporations alike. They sort through that code and wrangle it into one cohesive
kernel(hopefully).

Linux distributions are no different. Even corporate distributions like Ubuntu and RHEL are the
result of their developers taking hundreds of independent projects and stitching them together to
form a single system. Updates need to be managed on a case-by-case basis to provide one
independent software project from breaking a dozen others.

It all sounds pretty bad, right? This chaos has always been Linux's strength. It creates options. If a
project falls behind or takes a dubious direction, there are five more waiting to replace it. Linux
distributions are able to tailor themselves to specific use cases, and play to unique areas of focus
and strengths.

1.21 Philosophy

Both of these operating systems view themselves and their role in the computing world very
differently. Again, these different viewpoints influence where each excels.
16
▪ Unix

Unix was and still is a product. It doesn't come with any kind of social consciousness or political
goal. The purpose of Unix is to serve is a stable operating system for getting things done, that's
all.

The BSDs have adopted a more middle-ground approach. The BSD license allows BSD to be
freely distributed, shared, and modified. However, unlike the GPL, the BSD license doesn't
require projects based on BSD to remain free. As a result, BSD has become a favorite of
hardware manufacturers who use BSD as the basis of their own proprietary operating systems.
Plenty of routers are based on BSD, and the Playstation 4 even used BSD as the basis of its own
operating system.

▪ Linux

The Linux kernel is licensed under the GPLv2. Most of the core Linux utilities are from the GNU
project and are also GPL licensed. The result is a system that must remain free and open source
software. That's why RHEL, a commercial product, leaves its source open, leaving the door open
for CentOS to built a clone with the same code.

The GPL also means that if any company wants to base something off of Linux, they need to
leave the source open. While this might discourage some, most cases have resulted in companies
contributing their code to Linux as a whole and reaping the benefits along with everyone else.
Google used the Linux kernel for the core of both Android and Chrome OS. Now, they are one of
the biggest contributors to Linux development.

Linux has always been about community collaboration. While that may produce its share of
chaos, it also allows for a truly open ecosystem that allows the best contributions to rise to the
top.

1.22 Software And Utilities

There isn't much to say here other than that BSD has its own specific set of utilities while Linux
used GNU and whatever else the distribution maintainers decide will work best for their system.
17
In fact, there are plenty of Linux distributions that borrow tools and utilities from BSD. The raw
adaptability and flexibility of Linux has always been what has allowed it to survive and thrive.

1.23 Conclusion

Both operating systems are stable and reliable. Unix tends to be better at predictability. It's tame,
well engineered, and generally runs smoothly. Linux, on the other hand, can be as rock solid or
wild as the people assembling the system want it to be. If you want something that won't change
for ten years, install RHEL or CentOS. Do you want to fly by the seat of your pants on the
bleeding edge, put Arch on your machine. Maybe you don't like any of the available options. Go
ahead a build your own Linux distribution for yourself. No one's stopping you.

18

You might also like