Terminal GuideTerminal Guide

Kali Linux Guide

Kali Linux is a Debian-based distribution designed for penetration testing, security research, and digital forensics. It's maintained by Offensive Security.

10 min readLast updated: January 19, 2026
Dai Aoki

Dai Aoki

CEO at init, Inc. / CTO at US & JP startups / Creator of WebTerm

Overview

Kali Linux was released in 2013 as the successor to BackTrack. It's developed by Offensive Security and is the industry-standard distribution for penetration testing and ethical hacking.

Quick Facts

Based OnDebian Testing
Package ManagerAPT
Default DesktopXfce
Release CycleQuarterly updates (rolling)
Support PeriodContinuous (rolling)
Init Systemsystemd
Warning
Kali Linux is designed for security professionals. It should NOT be used as a daily driver or by beginners learning Linux. Use Ubuntu or Mint for general computing.

Who Should Use Kali?

  • Penetration testers - Comprehensive security toolkit
  • Security researchers - Analysis and vulnerability research
  • Digital forensics analysts - Forensic investigation tools
  • CTF participants - Capture The Flag competitions
  • Security students - Learning ethical hacking

Installation

Kali offers multiple installation methods:

  1. Download from kali.org (Installer, Live, or VM images)
  2. For VMs: Use pre-built VMware/VirtualBox images
  3. For bare metal: Create bootable USB and install
  4. For WSL: Install from Microsoft Store
bash
# Verify your download
sha256sum kali-linux-2024.1-installer-amd64.iso

# Kali on WSL (Windows)
wsl --install -d kali-linux

# Kali in Docker
docker pull kalilinux/kali-rolling
docker run -it kalilinux/kali-rolling /bin/bash

Package Management

Kali uses APT with specialized meta-packages for tool categories:

bash
# Update system
sudo apt update && sudo apt full-upgrade

# Install a tool category
sudo apt install kali-tools-web        # Web application tools
sudo apt install kali-tools-wireless   # Wireless attack tools
sudo apt install kali-tools-forensics  # Digital forensics

# Install individual tools
sudo apt install nmap metasploit-framework burpsuite

# List available meta-packages
apt-cache search kali-tools-

# Install full Kali toolset
sudo apt install kali-linux-everything
Info
Kali uses meta-packages to organize tools by category. You can install only what you need instead of the full 600+ tool collection.

Key Features

600+ Pre-installed Tools

Comprehensive collection of penetration testing, forensics, and reverse engineering tools.

Non-Root by Default

Since 2020, Kali runs as non-root user by default for better security during regular use.

Undercover Mode

Transform your desktop to look like Windows, useful when working in public spaces.

Kali NetHunter

Mobile penetration testing platform for Android devices.

Included Tools

Popular Tools by Category

Information GatheringNmap, Maltego, Recon-ng
Vulnerability AnalysisNikto, OpenVAS, Legion
Web ApplicationsBurp Suite, OWASP ZAP, SQLmap
Password AttacksJohn the Ripper, Hashcat, Hydra
Wireless AttacksAircrack-ng, Kismet, Wifite
ExploitationMetasploit Framework, BeEF
ForensicsAutopsy, Volatility, Foremost

FAQ

Should I use Kali as my main OS?

No. Kali is designed for security testing, not daily use. It makes security trade-offs that aren't appropriate for general computing. Use it in a VM or for specific tasks.

Is using Kali Linux illegal?

No, Kali itself is legal. However, using its tools against systems without authorization is illegal. Only test on systems you own or have explicit permission to test.

Do I need Kali to learn hacking?

Not necessarily. Many tools run on any Linux. However, Kali provides a convenient pre-configured environment with all tools ready to use.

Summary

Kali Linux is the premier distribution for security professionals and ethical hackers. Key takeaways:

  • Debian-based with 600+ security tools
  • Industry standard for penetration testing
  • Available as VM, USB, WSL, and mobile (NetHunter)
  • Not suitable for daily use or beginners
  • Use only on authorized systems

Official Documentation

For authoritative information, refer to the official documentation:

Related Articles