Kali Linux is a Debian-based Linux distribution specifically designed for digital forensics and penetration testing. It is maintained by Offensive Security and comes pre-loaded with over 600 security tools.
Unlike regular Linux distributions meant for everyday computing, Kali Linux is built for one purpose: finding and exploiting vulnerabilities — ethically and legally.
# On Linux/Mac, write ISO to USB:
sudo dd if=kali-linux.iso of=/dev/sdb bs=4M status=progress
# On Windows: use Rufus (free tool)
wsl --install -d kali-linux
# Then install tools:
sudo apt update && sudo apt install kali-linux-default -y
# Scan a network to find live hosts
nmap -sn 192.168.1.0/24
# Scan open ports on a target
nmap -sV -p 1-1000 192.168.1.1
# Aggressive scan (OS detection + scripts)
nmap -A 192.168.1.1
# Start Metasploit
msfconsole
# Search for exploits
search eternalblue
# Use an exploit module
use exploit/windows/smb/ms17_010_eternalblue
set RHOSTS 192.168.1.5
run
Intercepts and modifies HTTP requests between your browser and web applications. Used for testing SQL injection, XSS, IDOR, and every OWASP Top 10 vulnerability.
# Put wireless card in monitor mode
airmon-ng start wlan0
# Capture handshake
airodump-ng wlan0mon
# Crack WPA2 with dictionary
aircrack-ng capture.cap -w /usr/share/wordlists/rockyou.txt
# Crack password hash with John
john --wordlist=/usr/share/wordlists/rockyou.txt hashes.txt
# GPU-accelerated cracking with Hashcat
hashcat -m 0 hash.txt rockyou.txt
# Update all packages
sudo apt update && sudo apt upgrade -y
# List all installed tools by category
kali-menu
# Start a service (e.g., Apache web server)
sudo service apache2 start
# Check network interfaces
ip a
# Find a tool
find /usr -name "tool-name"
Kali Linux is for authorized testing only. Using these tools on systems you do not own or have explicit written permission to test is illegal under the Indian IT Act 2000 and similar laws worldwide. Always practice in controlled lab environments or on platforms like HackTheBox and TryHackMe.
🔥 Master Kali Linux with our structured ethical hacking course →
Subscribe to ONLY4YOU and get hands-on access to 40+ premium courses — Ethical Hacking, Kali Linux, Metasploit, Network Hacking, Bug Bounty & more!