Kali Linux Tutorial

Beginner · ⏱ 20 min read · Bug Bounty & Offensive Security

The hacker's operating system. Set up Kali Linux like a pro.

Kali Linux is the industry-standard penetration testing distribution with 600+ pre-installed security tools for reconnaissance, exploitation, forensics, and reporting.

Prerequisites

  • VirtualBox or VMware installed
  • 8GB+ RAM recommended
  • 80GB+ disk space
  • Basic Linux command-line familiarity

Installation Options

Choose: VM image (fastest), bare-metal, WSL2, Docker, or USB live boot.

VM Setup Tips

Allocate 4+ CPU cores, 8GB RAM, enable 3D acceleration, install guest additions.

First Boot & Updates

Update on first boot. Change default credentials. Configure timezone and keyboard.

Tool Categories Overview

Information Gathering, Vulnerability Analysis, Web Applications, Password Attacks, Wireless, Exploitation, Forensics, Reporting.

Top 20 Tools to Learn First

Nmap, Burp Suite, Metasploit, SQLMap, Wireshark, Hashcat, John, Hydra, Gobuster, Nikto, enum4linux, BloodHound, Responder, Impacket, Aircrack-ng, Maltego, theHarvester, Recon-ng, Nuclei, CrackMapExec.

Customization

Install additional tools, configure zsh + oh-my-zsh, set up aliases, create engagement workspaces.

Lab Setup

Build a practice lab with Metasploitable, DVWA, HackTheBox, or TryHackMe for safe legal practice.

Professional Workflow

1) Create workspace per engagement. 2) Run recon. 3) Document everything real-time. 4) Exploit and screenshot. 5) Generate report.

Frequently Asked Questions

Is Kali Linux free?

Yes, completely free and open-source. Maintained by Offensive Security.

Should I use Kali as daily OS?

No — designed for security testing. Run in a VM or dual-boot. Use Ubuntu/Fedora for daily tasks.

Kali vs Parrot OS?

Both excellent. Kali has more tools and stronger community. Parrot is lighter and better for daily use alongside security work.

Related Tools