{"id":6039,"date":"2013-03-15T10:33:19","date_gmt":"2013-03-15T13:33:19","guid":{"rendered":"http:\/\/www.ethicalhacker.com.br\/site\/?p=6039"},"modified":"2019-07-16T14:23:14","modified_gmt":"2019-07-16T17:23:14","slug":"kali-primeiras-impressoes","status":"publish","type":"post","link":"https:\/\/www.ethicalhacker.com.br\/site\/2013\/03\/tutorial-backtrack\/kali-primeiras-impressoes\/","title":{"rendered":"Kali Primeiras Impress\u00f5es"},"content":{"rendered":"<p>Como j\u00e1 \u00e9 de conhecimento, o Back|track renasce em sua vers\u00e3o 6 como Kali.<\/p>\n<p>Ap\u00f3s alguns testes, conclu\u00edmos que n\u00e3o mudou muita coisa. O sistema est\u00e1 mais leve e as ferramentas testadas funcionaram sem problemas.<\/p>\n<p>Abaixo algumas telas do Kali:<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/120.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-6041\" title=\"1\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/120-300x212.png\"  alt=\"\" width=\"300\" height=\"212\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/120-300x212.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/120.png 693w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/217.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-6042\" title=\"2\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/217-300x223.png\"  alt=\"\" width=\"300\" height=\"223\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/217-300x223.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/217.png 997w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/313.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-6043\" title=\"3\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/313-300x224.png\"  alt=\"\" width=\"300\" height=\"224\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/313-300x224.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/313.png 915w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/412.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-6044\" title=\"4\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/412-300x214.png\"  alt=\"\" width=\"300\" height=\"214\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/412-300x214.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/412.png 940w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/510.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-6045\" title=\"5\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/510-300x223.png\"  alt=\"\" width=\"300\" height=\"223\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/510-300x223.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/510.png 852w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/69.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-6046\" title=\"6\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/69-300x216.png\"  alt=\"\" width=\"300\" height=\"216\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/69-300x216.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/69.png 933w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/713.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-6047\" title=\"7\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/713-300x218.png\"  alt=\"\" width=\"300\" height=\"218\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/713-300x218.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/713.png 858w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/86.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-6048\" title=\"8\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/86-300x189.png\"  alt=\"\" width=\"300\" height=\"189\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/86-300x189.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/86-1024x647.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/86.png 1292w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/95.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-6049\" title=\"9\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/95-300x180.png\"  alt=\"\" width=\"300\" height=\"180\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/95-300x180.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/95-1024x616.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/95.png 1316w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>Download do Kali :<a href=\"http:\/\/www.kali.org\/downloads\/\" target=\"_blank\" rel=\"noopener noreferrer\">\u00a0http:\/\/www.kali.org\/downloads\/<\/a><\/p>\n<p>&nbsp;<\/p>\n\r\n\t\t<div class='author-shortcodes'>\r\n\t\t\t<div class='author-inner'>\r\n\t\t\t\t<div class='author-image'>\r\n\t\t\t<img src='https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/186048_100001838322519_1550894_n-11668_57x57.jpg' alt='' \/>\r\n\t\t\t<div class='author-overlay'><\/div>\r\n\t\t<\/div> <!-- .author-image --> \r\n\t\t<div class='author-info'>\r\n\t\t\t<p>Autor: S\u00edlvio C\u00e9sar Roxo Giavaroto<\/p>\n<p>\u00c9 MBA Especialista em Gest\u00e3o de Seguran\u00e7a da Informa\u00e7\u00e3o,\nTecn\u00f3logo em Redes de Computadores, C|EH Certified Ethical Hacker,\natua como Pentest e Analista de Seguran\u00e7a em Servidores Linux no\nGoverno do Estado de S\u00e3o Paulo, Professor Universit\u00e1rio , Instrutor\nC|EH e C|HFI.<\/p>\r\n\t\t<\/div> <!-- .author-info --><\/p>\r\n\t\t\t<\/div> <!-- .author-inner -->\r\n\t\t<\/div> <!-- .author-shortcodes -->\n","protected":false},"excerpt":{"rendered":"<p>Como j\u00e1 \u00e9 de conhecimento, o Back|track renasce em sua vers\u00e3o 6 como Kali. Ap\u00f3s alguns testes, conclu\u00edmos que n\u00e3o mudou muita coisa. O sistema est\u00e1 mais leve e as ferramentas testadas funcionaram sem problemas. Abaixo algumas telas do Kali: &nbsp; &nbsp; &nbsp; Download do Kali :\u00a0http:\/\/www.kali.org\/downloads\/ &nbsp;<\/p>\n","protected":false},"author":1,"featured_media":6040,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[101],"tags":[],"class_list":["post-6039","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tutorial-backtrack"],"_links":{"self":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/6039","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/comments?post=6039"}],"version-history":[{"count":4,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/6039\/revisions"}],"predecessor-version":[{"id":10511,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/6039\/revisions\/10511"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/media\/6040"}],"wp:attachment":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/media?parent=6039"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/categories?post=6039"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/tags?post=6039"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}