How to Install Kali Linux
Kali Linux Overview and Tools
How to install kali linux is a topic of today. Kali Linux is a Debian-based Linux distribution developed for advanced Penetration Testing & Security Auditing. Kali Linux contains several hundred tools for various information security tasks, such as Penetration Testing, Security research, Computer Forensics and Reverse Engineering. Leading information security and training company “Offensive Security”, founded and funded Kali.
Download Kali Linux
Click on the link to download Kali Linux
When Kali Linux was released?
Kali Linux was released on the 13th March 2013, top-to-bottom rebuild of BackTrack Linux, adhering completely to Debian development standards.
Installation requirements of Kali Linux
Installing Kali is too much easy and interesting. If you have compatible hardware you can do it easily. Kali is supported on i386, amd64, and ARM (both ARMEL and ARMHF) platforms. The minimum hardware requirements for installation of kali are listed below, however better hardware will naturally provide better performance.
- A minimum of 20 GB disk space.
- RAM for i386 and amd64 architectures, minimum: 1GB, recommended: 2GB or more.
- CD-DVD Drive / USB boot support/ Virtual Box
How to Install Kali Linux
Here we will explain the installation of Kali Linux in steps with images:
How to Install Kali Linux in steps:
To install Kali Linux, you have to boot the system with installation medium i.e CD or USB. After this, boot screen will appear on your screen and you have to choose Graphical Install or Text-Mode install.
Here we choose Graphical Install
Select the Language of your choice and click on continue
Select your location and click on continue
enter Hostname and click the continue button
Optional and provide domain name of your system. Click continue
To set up user account provide user name in the below screen and continue
Based on the step 6 user name will be created which can be changed from settings later. Click on continue
Set up time zone on the below screen and continue
Now the installer will give us partitioning methods out of which you have to select one and click on continue
Select the disk to be partitioned and click on continue
Select below Partitioning scheme if you are not well aware of this scheme
Now you can review your changes and click continue for finalization.
Now configure the package manager for configuration of network mirrors and enter proxy information if any.
Important: Choosing No on this screen, will not allow us to install packages from Kali repositories
Now we will be prompted to install GRUB.
Finally, we have done. Now Click on the Continue button to reboot and finalization of Kali Installation.
Tools of Kali Linux
There is a large list of tools that are pre-installed for ethical hacking using Kali. This list is too large and it is not possible to explain all tools, however some of the main tools are discussed below:
Aircrack-ng is a suite of Kali Linux tools used to assess WiFi network security. It focuses on key areas of WiFi security:
- Monitoring: Packet capture and export of data to text files for further processing by third-party tools
- Attacking: Replay attacks, de-authentication, fake access points, and others via packet injection
- Testing: Checking WiFi cards and driver capabilities (capture and injection)
- Cracking: WEP and WPA PSK (WPA 1 and 2)
All tools are command line which allows for heavy scripting. A lot of GUIs have taken advantage of this feature. It works primarily Linux but also Windows, OS X, FreeBSD, OpenBSD, NetBSD, as well as Solaris.
Network Mapper, “Nmap,” is a free and open source utility for network discovery and security auditing. This tool uses raw IP packets in stealthy or concealed ways to find hosts available on the network and it determines the services (application name and version) those hosts are offering. It also determines what operating systems they are running, what type of packet filters/firewalls are in use, and many of other characteristics.
Systems and network administrators also find it useful for tasks like:
- network inventory
- managing service upgrade schedules
- monitoring host or service uptime
- THC Hydra
When you need to brute force crack a remote authentication service, Hydra can do it for you. It has the capability to perform rapid dictionary attacks against more than 50 protocols, which includes telnet, FTP, HTTP, HTTPs, SMB, several databases, and much more. it can be used to crack into web scanners, wireless networks, packet crafters, etc.
Nessus is a remote scanning tool that you can use to check computers for security vulnerabilities or risks. It does not actively block any vulnerabilities or risk that your computers have but it can find them quickly running 1200+ vulnerability checks and throwing alerts when any security patches need to be made.
WireShark is an open-source packet analyzer. You can use it free of cost. With it, you can see the activities on a network from a microscopic level coupled with pcap file access, customizable reports, advanced triggers, alerts, etc. It is reportedly the world’s most widely-used network protocol analyzer for Linux.