How to Install Kali Linux onto a Virtual Machine
Kali Linux is an open-source, Debian-based Linux distribution that is geared toward various cyber security tasks. Developed by Mati Aharoni and Devon Kearns, and initially released on March 13, 2013, under the Offensive Security Company as a re-write of the BlackTrack operating system. This OS was originally meant to focus on Kernel Auditing.
Kali offers around 600 penetration-testing tools and was most prominently featured on the television show Mr. Robot.
The tagline of Kali Linux is "the quieter you become, the more you are able to hear", which is displayed on some of the system's backgrounds.
Kali Linux is distributed in both 32-bit and 64-bit images for use on host devices based on the x86 instruction set. There are also images available for ARM-based processors for use on the Beagle Board computer and Samsung's ARM Chromebook.
These devices include the following computers:
- Asus Chromebook Flip C100P
- BeagleBone Black
- HP Chromebook
- CubieBoard 2
- Raspberry Pi
- Odroid U2
- Odroid XU
- Odroid XU3
- Samsung Chromebook
- Utilite Pro
- Galaxy Note 10.1
Kali Linux is also officially available on Android devices thanks to the arrival of Kali NetHunter and officially supports the following devices...
and is available on more devices through unofficial community builds.
Minimum Hardware requirements
- A minimum of 20GB of hard disk space for installation depending on the version, Version 2020.2 requires at least 20GB.
- A minimum of 2GB RAM for i386 and AMD64 architectures.
- A bootable CD-DVD drive or a USB stick.
- A minimum of an Intel Core i3 or an AMD E1 processor for good performance.
Recommended Hardware Specs
- 50 GB of hard disk space, SSD preferred
- At least 2 GB of RAM
Kali Linux features a dedicated project for Android Devices named Kali NetHunter and is the first open-source Android penetration testing platform. Kali NetHunter supports the following...
- Wireless 802.11 frame injection
- One-click MANA Evil Access Point setups
- HID keyboard
- Bad USB MITM attacks
Kali Linux also features a forensic mode, which was carried over from Kali's predecessor BackTrack. This feature is meant to be used with Kali's bootable USB/CD as a way to make it easy to apply for a forensic job.
When booted into the forensic mode, the system does not touch the internal hard drive or swap space, and auto mounting is disabled.
Kali Linux features some of the following security tools
- Burp suite
- Cisco Global Exploiter
- John the Ripper
- Metasploit framework
- OWASP ZAP
- Social engineering tools
- Reverse engineering toolkit