Kali Linux: how to install and use the distro for ethical hacking

by | Oct 9, 2020

Kali Linux is a distribution based on Debian and specially designed for computer security audits. Developed by Offensive Security, it incorporates a wide catalog of tools to carry out computer forensics, penetration and reverse engineering testing... It can be truly useful for professionals in charge of IT security in an organization, administrators and network architects, security auditors, or anyone interested in learning about how to discover and even exploit vulnerabilities.

There are different ways to install this distro: directly on a computer, either desktop or laptop, on a virtualization platform, in AWS or Azure cloud, or on a USB boot disk. It can also be installed on Windows 10 natively using the command line, and on Mac, either as a primary or secondary system.

One of the easiest ways to install Kali Linux is to do the process from VirtualBox. At this link there is a complete tutorial that describes all the steps to follow to launch this distribution successfully in this way. If you are not familiar with its graphical user interface (GUI), you will find a description of its main sections in the same article.

An ideal supplement to use together with Kali Linux is Network Mapper. Better known as Nmap, it is an Open Source and free software used to analyze computer networks, detect connected devices, services and operating systems. Its functions can be customized through scripts to discover vulnerabilities and provide advanced threat detection services.

Another interesting tool is Metasploit Framework. Also Open Source, it is of great help when collecting information about security vulnerabilities and performing “Pentesting” (penetration tests). It can also be used to develop signatures for intrusion detection systems.

To learn more about Kali Linux, the two tools mentioned in this post and the possibilities offered by their joint use, see the original article published at Guru99.

SHARE

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *

Recent posts

VDI: The most secure environment for hybrid working

Today is Data Privacy Day. The purpose of this date is to raise awareness and promote privacy and data protection best practices. It was initiated by the European Commission, the Council of Europe, and the Data Protection authorities of the European Union’s member states. Their main goal was to drive attention to the importance of privacy, user data protection, and compliance of the General Data Protection Regulation (RGPD). It is a regulation characterized by significant fines for non-compliance since its implementation in 2018.

How to avoid issues with virtual machines

Virtualization comes with a wide range of benefits for organizations. It helps cut IT costs and reduces downtime while increasing efficiency and productivity. It also increases the resiliency of networks, primarily when disasters occur, and promotes more green-friendly operations.

However, using virtual machines also comes with a set of downsides. Information security may get compromised, workloads mixed up, separation duties lost, among other issues. It is vital to know how you can get over these problems, and that’s what this article will discuss.

Let’s get started.

Archives


Stay up to date with all the news from UDS ENTERPRISE through our social networks. Follow us!

Skip to content