-- Leo's gemini proxy

-- Connecting to gemini.tuxmachines.org:1965...

-- Connected

-- Sending request

-- Meta line: 20 text/gemini;lang=en-GB

Tux Machines


5 Reasons, why Hackers Use Kali Linux?


Posted by Roy Schestowitz on Dec 04, 2022


Linux 6.1-rc8 (UPDATED)

today's howtos


↺ Kali


Kali is the most popular and commonly used Linux by hackers to perform penetration testing or hacking. However, nowadays “hackers” term is not only used for the wrong group of people to perform “Black hat hacking”. There are ethical hackers those do white hat hacking to find out the security loopholes and make our system more secure and better.


Hence, Kali Linux distribution is widely used specialized Linux for security and penetration testing of IT systems. Out of the box, Kali Linux which is based on Debian offers numerous tools to perform various hacking and testing tasks.


For the Desktop interface by default, KALI uses XFCE, however, GNOME & KDE are also available. It is an open-source project, developed by Offensive Security, and is aimed primarily at professional users but can also be used by private individuals.


Earlier Kali Linux was known as BackTrack. It can be booted into a virtual machine and installed on a 32-bit or 64-bit x86 system as well as on computers with ARM architecture.


Even the single-board computer Raspberry Pi can also be operated with the Kali distribution. For some Android-based devices, the penetration testing platform NetHunter exists, which originated from Kali Linux.


Read on


↺ Read On: H2S Media




gemini.tuxmachines.org

-- Response ended

-- Page fetched on Thu Jun 13 11:52:40 2024