How to Install Kali Linux

kali linux

How to Install Kali Linux

Kali Linux Overview and Tools

How to install kali linux is a topic of today. Kali Linux is a Debian-based Linux distribution developed for advanced Penetration Testing & Security Auditing. Kali Linux contains several hundred tools for various information security tasks, such as Penetration Testing, Security research, Computer Forensics and Reverse Engineering. Leading information security and training company “Offensive Security”, founded and funded Kali.

Download Kali Linux

Click on the link to download Kali Linux

When Kali Linux was released?

Kali Linux was released on the 13th March 2013, top-to-bottom rebuild of BackTrack Linux, adhering completely to Debian development standards.

Installation requirements of Kali Linux

Installing Kali is too much easy and interesting. If you have compatible hardware you can do it easily. Kali is supported on i386, amd64, and ARM (both ARMEL and ARMHF) platforms. The minimum hardware requirements for installation of kali are listed below, however better hardware will naturally provide better performance.

  • A minimum of 20 GB disk space.
  • RAM for i386 and amd64 architectures, minimum: 1GB, recommended: 2GB or more.
  • CD-DVD Drive / USB boot support/ Virtual Box

How to Install Kali Linux

Here we will explain the installation of Kali Linux in steps with images:

How to Install Kali Linux in steps:

Step No.1 

To install Kali Linux, you have to boot the system with installation medium i.e CD or USB. After this, boot screen will appear on your screen and you have to choose Graphical Install or Text-Mode install.

Here we choose Graphical Install

Step No.2

Select the Language of your choice and click on continue

Step No.3

Select your location and click on continue

Step No.4

enter Hostname and click the continue button

Step No.5

Optional and provide domain name of your system. Click continue

Step No.6

To set up user account provide user name in the below screen and continue

Step No.7

Based on the step 6 user name will be created which can be changed from settings later. Click on continue

Step No.8

Set up time zone on the below screen and continue

Step No.9

Now the installer will give us partitioning methods out of which you have to select one and click on continue

Step No.10

Select the disk to be partitioned and click on continue

Step No.11

Select  below Partitioning scheme if you are not well aware of this scheme

Step No.12

Now you can review your changes and click continue for finalization.

Step No.13

Now configure the package manager for configuration  of network mirrors and enter proxy information if any.

Important: Choosing No on this screen, will not allow us to install packages from Kali repositories

Step No.14

Now we will be prompted to install GRUB.

Step No.15

Finally, we have done. Now Click on the Continue button to reboot and finalization of Kali Installation.

Tools of Kali Linux

There is a large list of tools that are  pre-installed for ethical hacking using Kali. This list is too large and it is not possible to explain all tools, however some of the main tools are discussed below:

  1. Aircrack-ng

Aircrack-ng is a suite of Kali Linux tools used to assess WiFi network security. It focuses on key areas of WiFi security:

  • Monitoring: Packet capture and export of data to text files for further processing by third-party tools
  • Attacking: Replay attacks, de-authentication, fake access points, and others via packet injection
  • Testing: Checking WiFi cards and driver capabilities (capture and injection)
  • Cracking: WEP and WPA PSK (WPA 1 and 2)

All tools are command line which allows for heavy scripting. A lot of GUIs have taken advantage of this feature. It works primarily Linux but also Windows, OS X, FreeBSD, OpenBSD, NetBSD, as well as Solaris.

  1. Nmap 

Network Mapper, “Nmap,” is a free and open source utility for network discovery and security auditing. This tool uses raw IP packets in stealthy or concealed  ways to find hosts available on the network and it determines the services (application name and version) those hosts are offering. It also determines  what operating systems they are running, what type of packet filters/firewalls are in use, and many of other characteristics.

Systems and network administrators also find it useful for tasks like:

  • network inventory
  • managing service upgrade schedules
  • monitoring host or service uptime
  1. THC Hydra

When you need to brute force crack a remote authentication service, Hydra can do it for you. It has the capability to perform rapid dictionary attacks against more than 50 protocols, which includes telnet, FTP, HTTP, HTTPs, SMB, several databases, and much more. it can be used to crack into web scanners, wireless networks, packet crafters, etc.

  1. Nessus 

Nessus is a remote scanning tool that you can use to check computers for security vulnerabilities or risks. It does not actively block any vulnerabilities or risk that your computers have but it can find them quickly running 1200+ vulnerability checks and throwing alerts when any security patches need to be made.

  1. WireShark 

WireShark is an open-source packet analyzer. You can use it free of cost. With it, you can see the activities on a network from a microscopic level coupled with pcap file access, customizable reports, advanced triggers, alerts, etc. It is reportedly the world’s most widely-used network protocol analyzer for Linux.