Useful Links
Computer Science
Operating Systems
Linux
Kali Linux
1. Introduction to Kali Linux
2. Getting Started with Kali Linux
3. Linux Fundamentals for Kali Users
4. The Penetration Testing Methodology
5. The Kali Linux Toolkit: Information Gathering
6. The Kali Linux Toolkit: Vulnerability Analysis
7. The Kali Linux Toolkit: Web Application Analysis
8. The Kali Linux Toolkit: Database Assessment
9. The Kali Linux Toolkit: Password Attacks
10. The Kali Linux Toolkit: Wireless Attacks
11. The Kali Linux Toolkit: Reverse Engineering
12. The Kali Linux Toolkit: Exploitation Tools
13. The Kali Linux Toolkit: Sniffing and Spoofing
14. The Kali Linux Toolkit: Post-Exploitation
15. The Kali Linux Toolkit: Forensics
16. The Kali Linux Toolkit: Reporting Tools
17. Advanced Kali Linux Usage
18. System Maintenance and Security
Getting Started with Kali Linux
System Requirements
Minimum Hardware Requirements
Recommended Hardware Specifications
Storage Considerations
Network Requirements
Acquiring Kali Linux
Official Download Sources
Kali Website
Mirrors and Torrents
Regional Mirrors
Selecting the Right Image
Installer Images
Live Images
ARM Images
Cloud Images
Container Images
Verifying Image Integrity
Checksums
SHA256 Verification
SHA512 Verification
GPG Signature Verification
Importing Public Keys
Signature Validation Process
Installation Methods
Bare Metal Installation
System Requirements
Full Disk Installation
Dual Boot Configuration
Windows Dual Boot
Linux Dual Boot
Boot Loader Configuration
Partitioning Schemes
Manual Partitioning
Guided Partitioning
LVM Configuration
Encrypted Partitions
Virtualization
Overview of Virtualization
VMware Workstation
Creating a New VM
VM Configuration Settings
Installing VMware Tools
Snapshot Management
VirtualBox
Creating a New VM
VM Configuration Settings
Installing Guest Additions
Shared Folders Setup
Hyper-V
Setting Up Kali on Hyper-V
Enhanced Session Mode
Integration Services
QEMU/KVM
VM Creation and Configuration
Performance Optimization
Windows Subsystem for Linux (WSL)
Installing Kali on WSL1
Installing Kali on WSL2
Limitations and Use Cases
GUI Applications in WSL
Cloud Deployments
AWS
Launching Kali Instances
Security Group Configuration
Storage Configuration
Cost Optimization
Azure
Deploying Kali on Azure
Network and Storage Considerations
Resource Management
Google Cloud Platform
GCP Deployment Options
Network Configuration
DigitalOcean
Droplet Creation
Firewall Configuration
Live Boot
Creating Bootable Media
USB Creation Tools
DVD Creation Process
Persistent vs Non-Persistent Live Sessions
Persistence Configuration
Live Boot Troubleshooting
Installation on ARM Devices
Supported ARM Devices
Installing on Raspberry Pi
Pi 3 Installation
Pi 4 Installation
Performance Considerations
Installing on Other ARM Boards
Post-Installation Configuration
Initial System Setup
System Updates and Upgrades
Updating Repositories
Upgrading the System
Handling Upgrade Issues
Configuring Network Settings
Wired Network Setup
Wireless Network Setup
Static vs Dynamic IP Configuration
DNS Configuration
Security Configuration
Changing Default Credentials
Setting a Strong Root Password
Creating Non-root Users
SSH Key Configuration
Firewall Configuration
UFW Setup
iptables Configuration
Desktop Environment Setup
Installing Guest Additions
VirtualBox Guest Additions
VMware Tools
Enhanced Integration Features
Customizing the Desktop Environment
Choosing a Desktop Environment
XFCE Customization
GNOME Customization
KDE Customization
Appearance and Usability Tweaks
Accessibility Options
Additional Software Installation
Essential Development Tools
Additional Security Tools
Productivity Applications
Previous
1. Introduction to Kali Linux
Go to top
Next
3. Linux Fundamentals for Kali Users