Get Started with KALI Linux!

Get Started with KALI Linux!

Get started in ethical hacking with this quick, simple step-by-step guide.

It's crazy just how many Cybersecurity courses simply overlook this essential tool. It's always going to be your first step on the journey to becoming a fully certified ethical hacker (aka "Penetration Tester").

⚠️ There's only one important warning: Any improper use of a computer is a crime under the UK Computer Misuse Act of 1990, and will land you in jail. Remember, you can test your own defences, and learn a lot by doing so, but hacking someone else's network or devices will sometimes earn you more jail time than if you just straight up murdered them. Laws are weird that way.

  1. Buy a cheap USB memory stick. Anything 128Mb to 1Tb will do, ideally USB3 and physically robust, try not to spend more than £30 though.
  2. Use this testing software https://www.grc.com/validrive.htm to check the USB you bought really is as big as it’s supposed to be. There are a lot of fake USB drives out there for sale.
  3. Wipe it thoroughly! On a Mac that's easy, but if you've never messed around with drive formatting before, you'll want to be very careful and learn a few basics first. Just Google it. You’ll need about 20 hours of computer time to overwrite every memory sector of the USB stick with zeroes so it’s properly “clean”. Yes, this bit might be a "leave it overnight" job.
  4. Get your free KALI Live software: https://www.kali.org/get-kali/#kali-live
  5. Watch this 6 minute tutorial video https://www.youtube.com/watch?v=FYYU9qZ0Pps
  6. You also need about 30 minutes to an hour to go through the process of partitioning your USB drive and installing KALI Linux, with “persistence” on it, following the tutorial video.
  7. Now try it out! Insert your USB into a suitable device and boot it up into KALI. Maybe use a burner laptop, if you have one 🙂.
  8. Explore the free tools within KALI on your own network, accounts and equipment only! Want guides on this, and some of the tools in KALI? Here you go: Kali Linux overview for Beginners

Good luck. 🍀

Disclaimer: You do any of this at your own risk, you mess up, that's on you.

So, now you’ve got Kali, here’s some guidance on how to use the most important/renowned tools in it, including a few more video tutorials.

1. nmap: A network scanning and reconnaissance tool.

Use: Discovers hosts and services on a computer network by sending packets and analysing the responses.

Why: Essential for network inventory, managing service upgrade schedules, and monitoring host or service uptime. It helps security professionals understand the network layout and detect vulnerable devices.

Video: https://youtu.be/NYgDzO8iQJ0&t=1

2. BurpSuite: Comprehensive web vulnerability scanner.

Use: Intercepts HTTP/S traffic between the web browser and servers, allowing detailed inspection and modification of requests.

Why: Vital for identifying and exploiting vulnerabilities in web applications to enhance security. It helps security testers find and patch weaknesses before malicious actors can exploit them.

Video: 30 min guide from John Hammond https://youtu.be/G3hpAeoZ4ek?si=HSeC5rNflHwMs1Il&t=64

3. Metasploit: Penetration testing and exploit development framework.

Use: Assists in developing, testing, and executing exploits against remote targets.

Why: Crucial for assessing security vulnerabilities, performing penetration tests, and testing defences. It helps security professionals simulate attacks to find and fix vulnerabilities.

Metasploit Beginners Guide (text) from Varonis

Video: 4 year-old 30 min intro to Metasploit https://youtu.be/TieUDcbk-bg&t=1

4. Wireshark: A network protocol analyser.

Use: Captures and analyses network traffic in real-time, providing detailed insights into data packets.

Why: Key for diagnosing network issues, troubleshooting, and network security auditing. It helps administrators understand network behaviour and detect anomalies.

Video: 20 min intro to how to use it, etc https://youtu.be/qTaOZrDnMzQ?si=zJ4T-6rf0jNsJjG_

5. John the Ripper: A password cracking tool.

Use: Tests password strength by attempting to crack hashed passwords.

Why: Important for identifying weak passwords to enhance system security. It helps administrators enforce stronger password policies by highlighting weak passwords.

How to crack passwords using John theRipper (text guide, from FreeCodeCamp)

Video 1: https://youtu.be/L6tL1xQmmqM&t=1

Video 2: https://youtu.be/C9wP49Z2JBQ?si=mlET1jlK-z24Qvw2

6. Snort: Intrusion detection and prevention system (IDS/IPS).

Use: Monitors network traffic for suspicious activities and alerts administrators.

Why: Essential for detecting and preventing network intrusions. It helps organisations detect and respond to potential security threats in real-time.

Video: Free 1hr 20 min full Snort tutorial video from Try Hack Me! https://youtu.be/pvPdOO2VcwM&t=1

7. Aircrack-ng: WiFi hacking and security assessment tool.

Use: Captures and analyses Wi-Fi traffic, cracks WEP/WPA-PSK keys.

Why: Critical for testing and improving the security of wireless networks. It helps administrators find and fix security flaws in Wi-Fi networks.

Video: 4 min video via David Bombal https://youtu.be/VvglE8SWeJ8&t=1


Have fun learning!

#CyberSecurity #InfoSec #DataProtection #Privacy #ThreatIntelligence #CyberAwareness


Follow me for more articles, as well as on other topics I teach such as Art & Design, Coding or Web Development.

As usual for articles on LinkedIn, here are some other articles I've published:

10 Cybersecurity Tips You REALLY Need:

01: Protect Your Devices

02: Update Security & Privacy Settings

03: OSINT Yo' Self!

04: Public vs Private Identities

05: WiFi Safety

06: Passwords

07: Email & SMS

08: Cookies & Shopping!

09: Links and Tracking

7 Real Principles of Logo Design

WiX Pros & Cons (+ 2 Bug Fixes!)

Digital Marketing List for Creatives

Why YOU Should Learn Code

10 Top Tips for Web Success!

10 Top Tips for CVs and More!

The Death of Art: The AI Revolution

The Rebirth of Art; How I Learned to Stop Worrying and Love the AI Bomb

Spot a typo, an error or just plain disagree? I welcome your comments and feedback to help improve this series of articles. If you'd like to learn more, just Connect or get in touch using the contact details in my profile.

This is draft 1.0, it will be updated with links to subsequent articles in the series as they are published.


To view or add a comment, sign in

More articles by Tom Myfield

  • The Dark Side of AI 🤖

    I'm sure you've learned to love AI as much as I do, and if you're hooked into all the AI gurus on LinkedIn then you'll…

    1 Comment
  • Agents are here! (oh no they're not!)

    Heard the term "Agent" or "Agentic" when people talk about AI? The old pantomime is starting again. Just like back when…

    1 Comment
  • Index of Articles

    Welcome. It's likely you arrived here because someone (probably me) sent you a link.

  • Hey, Let's Take Out a Country!

    Remember remember the 5th of November, gunpowder treason..

  • Good and Bad Actors

    Who made a better Joker- Heath Ledger or Joaquim Phoenix? No, that’s not the kind of actor we’re talking about here…

  • Happy Cyber Security Awareness Month!

    1. Foundations of Cyber Security: Safeguarding Your Digital Future Everyday you go to work on a digital device, but how…

    2 Comments
  • Vote for YOU!

    Introducing "Vote for Yourself" a new party agnostic, non-partisan, campaign for an equitable future. Are you still…

  • The Rebirth of Art: How I learned to stop worrying and love the AI-bomb

    Last year there was a devastating explosion of effective AI art tools. Many artists are still reeling.

    2 Comments
  • Fight the Fear of Presenting

    Everyone dreads the big presentation. That big day when the clock runs out, the deadline comes around and you’ve got to…

  • Make the Best Slideshows in the Business!

    Ever delivered a slideshow that someone else made? As presenters, educators, trainers or just the one that got handed…

    4 Comments

Others also viewed

Explore content categories