This report discusses the use of IPtables and firewall rules to secure Kali Linux systems. It provides a methodology for securing the operating system and demonstrates the use of IPtables to block, filter, and drop incoming data packets. The report covers XMAS tree attack, SYN-FLOOD attack, null packet attacks, and force fragment attacks. It also includes a conclusion and references.