percorso: Home

Kali Linux - the pentester's most used distro


Kali Linux: How to Install, Launch, and Use It for Ethical Hacking

Kali Linux is the world’s most recognized Linux distribution for ethical hacking, penetration testing, and cybersecurity research. Developed and maintained by Offensive Security, Kali Linux provides a complete toolkit for security professionals and students who want to understand, test, and secure digital systems.

This specialized operating system includes hundreds of preinstalled tools designed for information gathering, network scanning, vulnerability analysis, exploitation, forensics, and reverse engineering. Whether you’re an ethical hacker, security analyst, or IT student, Kali Linux is the ideal platform to practice cybersecurity techniques safely and legally.

This guide explains how to install Kali Linux on a virtual machine (VM) using Windows, Linux, or macOS, how to start and use it, and which tools you’ll find preloaded when you boot it up.

Why Use Kali Linux?

Kali Linux isn’t just another Linux distribution — it’s a security-focused platform built for penetration testing and digital forensics. It enables cybersecurity professionals to simulate real-world cyberattacks in controlled environments, helping them identify vulnerabilities before malicious actors exploit them.

Key reasons to use Kali Linux include:

Preloaded Security Tools: Over 600 tools for reconnaissance, scanning, exploitation, and reporting.

Customizable Environments: Lightweight and highly configurable for virtual machines and live booting.

Community and Support: Backed by Offensive Security and a large ethical hacking community.

Free and Open Source: No licensing restrictions, freely available to anyone.

System Requirements for Kali Linux

Before installation, make sure your host system meets the minimum requirements:

Processor: 64-bit CPU (Intel/AMD)

RAM: Minimum 2 GB (4 GB or more recommended)

Storage: 20 GB of free disk space

Virtualization Software: VMware Workstation, VMware Fusion, or Oracle VirtualBox

Kali can run natively on hardware, but using a virtual machine is safer and more flexible, especially for beginners. You can isolate the testing environment, snapshot progress, and revert to safe states after experiments.

Installing Kali Linux in a Virtual Machine

Kali Linux provides prebuilt virtual machine images that can be imported directly into VMware or VirtualBox — no manual setup required. Alternatively, you can install it from an ISO file.

Below are step-by-step installation guides for Windows, Linux, and macOS users.

1. Installing Kali Linux on Windows (Using VirtualBox or VMware)

Step 1 – Download Required Files
Go to the official Kali Linux website
and download the Kali Linux VirtualBox or VMware image.

Make sure you download the version compatible with your virtualization tool.

Step 2 – Extract and Import the Image
Unzip the downloaded .7z or .zip file.

In VirtualBox, open the application → File → Import Appliance → select the .ova file.

In VMware Workstation, go to File → Open and import the .vmx file.

Step 3 – Configure System Settings
Assign at least 2 GB RAM and 2 CPU cores for optimal performance.

Enable Network Adapter → NAT or Bridged mode for internet connectivity.

Step 4 – Start Kali Linux
Click Start in VirtualBox or Power On in VMware. Once booted, you’ll see the login screen.

Default credentials:

Username: kali

Password: kali

You’re now inside a full-featured ethical hacking environment.

2. Installing Kali Linux on macOS

Step 1 – Install Virtualization Software
Download and install VMware Fusion or VirtualBox for macOS.

Step 2 – Get the Kali Image
Visit the Kali Linux downloads page
and select the VMware image for macOS.

Step 3 – Import and Configure
Open VMware Fusion → File → Import → locate the .vmx file.
Assign RAM (2–4 GB) and CPU cores (2+).

Step 4 – Start the Virtual Machine
Once the VM boots, use the same credentials (kali/kali) to log in.
From here, you can update the system with:

sudo apt update && sudo apt upgrade -y


Your macOS system now runs Kali Linux securely within a virtualized environment.

3. Installing Kali Linux on Linux

If you’re already running a Linux-based OS such as Ubuntu, Debian, or Fedora, you can install Kali using VirtualBox or KVM (Kernel-based Virtual Machine).

Step 1 – Install VirtualBox or KVM
sudo apt install virtualbox -y


or for KVM:

sudo apt install qemu-kvm libvirt-daemon-system libvirt-clients bridge-utils virt-manager -y


Step 2 – Download Kali Image
Get the VirtualBox image from the official Kali website.

Step 3 – Import Image
In VirtualBox → File → Import Appliance → select the .ova file.

Step 4 – Start and Update
Run the VM, log in, and perform:

sudo apt update && sudo apt dist-upgrade -y

How to Start Kali Linux and Navigate the Interface

After installation, you’ll boot into the XFCE desktop environment (Kali’s default lightweight desktop). The main menu categorizes tools into sections such as:

Information Gathering

Vulnerability Analysis

Web Application Analysis

Exploitation Tools

Wireless Attacks

Forensics and Reporting

You can access the terminal at any time by pressing Ctrl + Alt + T, the primary interface for running most security tools.

Core Functions and Basic Uses of Kali Linux

Kali Linux enables cybersecurity professionals to perform penetration testing, vulnerability scanning, digital forensics, and security auditing. It’s an all-in-one lab for learning and practicing ethical hacking safely.

Below are common tasks and examples:

1. Information Gathering

Discover network and system details before exploitation.

Tool: Nmap — scans networks, identifies devices, and detects open ports.

Example:

nmap -sV 192.168.1.1/24

2. Vulnerability Analysis

Find weaknesses in software and configurations.

Tool: Nikto — scans web servers for vulnerabilities.

Example:

nikto -h http://target.com

3. Exploitation

Use frameworks to exploit discovered vulnerabilities.

Tool: Metasploit Framework — automates exploit development and payload delivery.

Example:

msfconsole

4. Wireless Attacks

Audit wireless security and capture traffic.

Tool: Aircrack-ng — cracks Wi-Fi passwords and monitors wireless traffic.

Example:

airodump-ng wlan0

5. Password Cracking

Test password strength and recover lost credentials.

Tool: John the Ripper or Hydra — performs brute-force or dictionary attacks.

Example:

john --wordlist=/usr/share/wordlists/rockyou.txt hash.txt

6. Digital Forensics

Recover and analyze digital evidence from compromised systems.

Tool: Autopsy or Foremost — recover deleted files and investigate disk images.

7. Social Engineering

Simulate phishing and social attacks in a controlled way.

Tool: Social Engineering Toolkit (SET) — creates fake login pages or phishing emails for awareness training.

Example:

setoolkit

8. Reverse Engineering

Analyze malicious software or binaries.

Tool: Ghidra or Radare2 — disassemble and study malware behavior.

Maintaining and Updating Kali Linux

Kali Linux is regularly updated to include the latest cybersecurity tools and patches. To keep your system secure and efficient, run:

sudo apt update && sudo apt full-upgrade -y


You can also install new tools from the Kali Linux repositories or through Metasploit modules and GitHub scripts.

For advanced use, try running Kali in headless mode (no GUI) or connecting it to other virtualized systems to simulate attack/defense networks.

Ethical Use of Kali Linux

While Kali Linux includes offensive security tools, it must only be used in authorized environments or labs you own or manage. Always obtain explicit permission before testing systems or networks — unauthorized use can violate cybersecurity laws.