Kali Linux Tutorial
Beginner · ⏱ 20 min read · Bug Bounty & Offensive Security
The hacker's operating system. Set up Kali Linux like a pro.
Kali Linux is the industry-standard penetration testing distribution with 600+ pre-installed security tools for reconnaissance, exploitation, forensics, and reporting.
Prerequisites
- VirtualBox or VMware installed
- 8GB+ RAM recommended
- 80GB+ disk space
- Basic Linux command-line familiarity
Installation Options
Choose: VM image (fastest), bare-metal, WSL2, Docker, or USB live boot.
VM Setup Tips
Allocate 4+ CPU cores, 8GB RAM, enable 3D acceleration, install guest additions.
First Boot & Updates
Update on first boot. Change default credentials. Configure timezone and keyboard.
Tool Categories Overview
Information Gathering, Vulnerability Analysis, Web Applications, Password Attacks, Wireless, Exploitation, Forensics, Reporting.
Top 20 Tools to Learn First
Nmap, Burp Suite, Metasploit, SQLMap, Wireshark, Hashcat, John, Hydra, Gobuster, Nikto, enum4linux, BloodHound, Responder, Impacket, Aircrack-ng, Maltego, theHarvester, Recon-ng, Nuclei, CrackMapExec.
Customization
Install additional tools, configure zsh + oh-my-zsh, set up aliases, create engagement workspaces.
Lab Setup
Build a practice lab with Metasploitable, DVWA, HackTheBox, or TryHackMe for safe legal practice.
Professional Workflow
1) Create workspace per engagement. 2) Run recon. 3) Document everything real-time. 4) Exploit and screenshot. 5) Generate report.
Frequently Asked Questions
Is Kali Linux free?
Yes, completely free and open-source. Maintained by Offensive Security.
Should I use Kali as daily OS?
No — designed for security testing. Run in a VM or dual-boot. Use Ubuntu/Fedora for daily tasks.
Kali vs Parrot OS?
Both excellent. Kali has more tools and stronger community. Parrot is lighter and better for daily use alongside security work.