

If you have no experience of Linux or are looking for a desktop to use on a daily basis, then Kali Linux is probably not for you. Adding additional repositories runs a serious risk of corrupting the system

Kali is based on Debian and is aimed at penetration testing and security auditing. This tutorial assumes you have some knowledge of Linux and are interested in learning more about penetration testing. It holds a repository of tools designed for hacking wireless networks, web applications and databases as well as for reverse engineering, password cracking and many others.

Kali is a Linux distribution created by Offensive Security and is specifically designed for ethical hackers who want to do penetration testing.

It is the first in a series of tutorials which will help you to setup the proper environment for using Kali Linux and then show you how to use it’s tools.The tutorials in the series include:īy the end of this session you will be able to: describe Kali Linux decide if you should be using Kali Linux download and verify the Kali Live ISO install Oracle Virtual Box (VBox) and install Kali Linux in VBox. This tutorial will teach you how to install Kali Linux as a VM using Virtual Box.
