Kali Linux
{{Short description|Debian-based Linux distribution for penetration testing}}
{{Use mdy dates|date=January 2025}}
{{Infobox OS
| name = Kali Linux
| logo = Kali_Linux_2.0_wordmark.svg
| screenshot = 275px
| caption =
| developer = Offensive Security
| license = GNU General Public License v3.0
| website = {{Url|https://www.kali.org/}}
| support status = Active
| source_model = Open-source
| released = {{Start date and age|2013|03|13|paren=yes}}{{cite web|url=https://www.kali.org/kali-linux-releases/|title=Official Kali Linux Releases|access-date=August 29, 2020|archive-date=February 2, 2020|archive-url=https://web.archive.org/web/20200202205308/https://www.kali.org/kali-linux-releases/|url-status=live}}
| latest release version = {{wikidata|property|preferred|references|edit|Q8364850|P348|P548=Q2804309}}
| latest release date = {{Start date and age|{{wikidata|qualifier|preferred|single|Q8364850|P348|P548=Q2804309|P577}}}}
| latest_test_version =
| supported_platforms = x86, x86-64, armel, armhf
| kernel_type = Monolithic (Linux)
| working_state = Active
| package_manager = APT (several front-ends available)
| updatemodel = Rolling release
}}
Kali Linux is a Linux distribution designed for digital forensics and penetration testing.*{{cite web |url=http://linuxbsdos.com/2013/03/14/kali-linux-1-0-review/ |title=Kali Linux 1.0 review |website=LinuxBSDos.com |date=March 14, 2013 |access-date=November 26, 2019 |archive-date=July 12, 2019 |archive-url=https://web.archive.org/web/20190712081419/http://linuxbsdos.com/2013/03/14/kali-linux-1-0-review/ |url-status=live }}
- {{cite web |url=https://www.linux.com/news/review-backtrack-2-security-live-cd |title=Review: BackTrack 2 security live CD |website=Linux.com |date=April 24, 2007 |first=Lorenzo |last=Simionato |access-date=April 10, 2019 |archive-date=May 3, 2019 |archive-url=https://web.archive.org/web/20190503122842/https://www.linux.com/news/review-backtrack-2-security-live-cd |url-status=live }}
- {{cite web |url=https://www.linux.com/news/test-your-environments-security-backtrack |title=Test your environment's security with BackTrack |website=Linux.com |first=Joe |last=Barr |date=June 13, 2008 |access-date=April 10, 2019 |archive-date=July 12, 2018 |archive-url=https://web.archive.org/web/20180712221125/https://www.linux.com/news/test-your-environments-security-backtrack |url-status=live }}
- {{cite web |url=https://www.dedoimedo.com/computers/backtrack.html |title=BackTrack 4 - Hacking galore |date=May 15, 2009 |website=Dedoimedo.com |access-date=April 10, 2019 |archive-date=September 11, 2019 |archive-url=https://web.archive.org/web/20190911213118/https://www.dedoimedo.com/computers/backtrack.html |url-status=live }}
- {{cite web |url=http://linuxbsdos.com/2012/08/17/backtrack-5-r3-review/ |title=BackTrack 5 R3 review |website=LinuxBSDos.com |date=August 17, 2012 |access-date=April 10, 2019 |archive-date=September 27, 2019 |archive-url=https://web.archive.org/web/20190927114327/http://linuxbsdos.com/2012/08/17/backtrack-5-r3-review |url-status=live }} It is maintained and funded by Offensive Security.*{{cite web |url=https://www.zdnet.com/article/hands-on-with-kali-linux-1-0-7/ |title=Hands-on with Kali Linux 1.0.7 |website=ZDNet.com |date=May 28, 2014 |first=J.A. |last=Watson |access-date=April 10, 2019 |archive-date=February 27, 2018 |archive-url=https://web.archive.org/web/20180227030959/http://www.zdnet.com/article/hands-on-with-kali-linux-1-0-7/ |url-status=live }}
- {{cite web |url=http://linuxbsdos.com/2014/05/30/kali-linux-1-0-7-review/ |title=Kali Linux 1.0.7 review |website=LinuxBSDos.com |date=May 30, 2014 |access-date=April 10, 2019 |archive-date=September 27, 2019 |archive-url=https://web.archive.org/web/20190927111829/http://linuxbsdos.com/2014/05/30/kali-linux-1-0-7-review/ |url-status=live }}
- {{cite web |url=https://www.dedoimedo.com/computers/kali-linux.html |title=Kali Linux review |website=Dedoimedo.com |date=December 15, 2014 |access-date=April 10, 2019 |archive-date=August 23, 2019 |archive-url=https://web.archive.org/web/20190823073404/https://www.dedoimedo.com/computers/kali-linux.html |url-status=live }}
- {{cite web |url=https://www.zdnet.com/article/hand-on-with-kali-linux-rolling/ |title=Hands-on with Kali Linux Rolling |website=ZDNet.com |date=January 22, 2016 |first=J.A. |last=Watson |access-date=April 10, 2019 |archive-date=April 10, 2019 |archive-url=https://web.archive.org/web/20190410145833/https://www.zdnet.com/article/hand-on-with-kali-linux-rolling/ |url-status=live }}
- {{cite magazine |url=https://distrowatch.com/weekly.php?issue=20160425#kali |title=Kali Linux 2016.1 |magazine=DistroWatch Weekly |issue=658 |date=April 25, 2016 |first=Jesse |last=Smith |access-date=April 10, 2019 |archive-date=July 30, 2019 |archive-url=https://web.archive.org/web/20190730120616/https://distrowatch.com/weekly.php?issue=20160425#kali |url-status=live }} The software is based on the Debian Testing branch: most packages Kali uses are imported from the Debian repositories.{{cite web |date=March 11, 2013 |title=Kali's Relationship With Debian |url=https://docs.kali.org/policy/kali-linux-relationship-with-debian |access-date=April 10, 2019 |publisher=Kali Linux |archive-date=July 2, 2018 |archive-url=https://web.archive.org/web/20180702122056/https://docs.kali.org/policy/kali-linux-relationship-with-debian |url-status=live }} The tagline of Kali Linux and BackTrack is "The quieter you become, the more you are able to hear", which is displayed on some backgrounds, see this example.
Kali Linux has approximately 600{{cite web |url=https://tools.kali.org/ |title=Kali Linux Penetration Testing Tools |website=tools.kali.org |access-date=April 10, 2019 |archive-date=September 24, 2021 |archive-url=https://web.archive.org/web/20210924181938/https://tools.kali.org/ |url-status=live }} penetration-testing programs (tools), including Armitage (a graphical cyber attack management tool), Nmap (a port scanner), Wireshark (a packet analyzer), metasploit (penetration testing framework), John the Ripper (a password cracker), sqlmap (automatic SQL injection and database takeover tool), Aircrack-ng (a software suite for penetration-testing wireless LANs), Burp suite and OWASP ZAP web application security scanners,{{Cite web|url=https://www.kali.org/news/kali-linux-metapackages/|title=Kali Linux Metapackages|website=www.kali.org|date=February 26, 2014|access-date=December 22, 2019|archive-date=April 23, 2016|archive-url=https://web.archive.org/web/20160423161151/https://www.kali.org/news/kali-linux-metapackages/|url-status=live}}{{Cite web|url=http://www.h-online.com/open/news/item/Kali-Linux-arrives-as-enterprise-ready-version-of-BackTrack-1822241.html|title=Kali Linux arrives as enterprise-ready version of BackTrack - The H Open: News and Features|website=www.h-online.com|access-date=December 22, 2019|archive-date=March 14, 2016|archive-url=https://web.archive.org/web/20160314142138/http://www.h-online.com/open/news/item/Kali-Linux-arrives-as-enterprise-ready-version-of-BackTrack-1822241.html|url-status=live}} etc.{{Cite web|url=https://www.kali.org/blog/mr-robot-arg-society|title=Mr. Robot and Kali Linux|date=December 29, 2020|access-date=June 27, 2022|archive-date=May 4, 2023|archive-url=https://web.archive.org/web/20230504113701/https://www.kali.org/blog/mr-robot-arg-society/|url-status=live}}/
It was developed by Mati Aharoni and Devon Kearns of Offensive Security through the rewrite of BackTrack, their previous information security testing Linux distribution based on Knoppix.{{Citation needed|date=March 2023}}
Kali Linux's popularity grew when it was featured in multiple episodes of the TV series Mr. Robot. Tools highlighted in the show and provided by Kali Linux include Bluesniff, Bluetooth Scanner (btscanner), John the Ripper, Metasploit Framework, Nmap, Shellshock, and Wget.{{Cite web|url=https://itsfoss.com/kali-linux-review/|title=The Kali Linux Review You Must Read Before You Start Using it|last=Leroux|first=Sylvain|website=itsfoss.com|date=May 3, 2017|language=en-US|access-date=April 15, 2020|archive-date=April 14, 2020|archive-url=https://web.archive.org/web/20200414131346/https://itsfoss.com/kali-linux-review/|url-status=live}}{{Cite news|last=Grauer|first=Yael|url=https://www.wired.com/2015/08/peek-inside-mr-robots-toolbox/|title=A Peek Inside Mr. Robot's Toolbox|date=August 26, 2015|magazine=Wired|access-date=April 15, 2020|issn=1059-1028|archive-date=September 8, 2015|archive-url=https://web.archive.org/web/20150908111032/http://www.wired.com/2015/08/peek-inside-mr-robots-toolbox|url-status=live}}{{Cite web|url=https://hackertarget.com/hacker-tools-mr-robot/|title=Exploring the Hacker Tools of Mr Robot|date=August 21, 2015|website=HackerTarget.com|language=en-US|access-date=April 15, 2020|archive-date=December 17, 2019|archive-url=https://web.archive.org/web/20191217023441/https://hackertarget.com/hacker-tools-mr-robot/|url-status=live}}
Features
Kali Linux has a dedicated project set aside for compatibility and porting to specific Android devices, called Kali NetHunter.{{cite web |title=Kali Linux NetHunter for Nexus and OnePlus |url=https://www.kali.org/kali-linux-nethunter/ |url-status=live |archive-url=https://web.archive.org/web/20170102042508/https://www.kali.org/kali-linux-nethunter/ |archive-date=January 2, 2017 |access-date=April 10, 2019}}
It is the first open source Android penetration testing platform for Nexus devices, created as a joint effort between the Kali community member "BinkyBear" and Offensive Security. It supports Wireless 802.11 frame injection, one-click MANA Evil Access Point setups, HID keyboard (Teensy like attacks), as well as Bad USB MITM attacks.
BackTrack (Kali's predecessor) contained a mode known as forensic mode, which was carried over to Kali via live boot. This mode is very popular for many reasons, partly because many Kali users already have a bootable Kali USB drive or CD, and this option makes it easy to apply Kali to a forensic job. When booted in forensic mode, the system doesn't touch the internal hard drive or swap space and auto mounting is disabled. However, the developers recommend that users test these features extensively before using Kali for real world forensics.{{cite web |title=Kali Linux Forensics Mode |url=https://docs.kali.org/general-use/kali-linux-forensics-mode |url-status=live |archive-url=https://web.archive.org/web/20191125142754/https://docs.kali.org/general-use/kali-linux-forensics-mode |archive-date=November 25, 2019 |access-date=April 10, 2019}}
Version history
The first version, 1.0.0 "moto", was released in March 2013.
With version 2019.4 in November 2019, the default user interface was switched from GNOME to Xfce, with a GNOME version still available.{{cite web|first1=Marius|last1=Nestor|access-date=November 29, 2019|title=Kali Linux Ethical Hacking OS Switches to Xfce Desktop, Gets New Look and Feel|url=https://news.softpedia.com/news/kali-linux-ethical-hacking-os-switches-to-xfce-desktop-gets-new-look-and-feel-528328.shtml|website=softpedia|date=November 26, 2019|archive-date=June 30, 2020|archive-url=https://web.archive.org/web/20200630015400/https://news.softpedia.com/news/kali-linux-ethical-hacking-os-switches-to-xfce-desktop-gets-new-look-and-feel-528328.shtml|url-status=live}}
With version 2020.3 in August 2020, the default shell was switched from Bash to ZSH, with Bash remaining as an option.{{Cite web|last=|first=|date=November 18, 2020|title=Kali Linux 2020.4 Release|url=https://www.kali.org/news/kali-linux-2020-4-release/|archive-url=https://web.archive.org/web/20210129134940/https://www.kali.org/news/kali-linux-2020-4-release/|archive-date=January 29, 2021|access-date=January 12, 2021|website=www.kali.org|url-status=live}}
With version 2024.4 in December 2024, version 6.11 of the Linux kernel is introduced, official support for 32-bit images is dropped, and DSA keys are deprecated for OpenSSH.{{Cite web |date=December 16, 2024 |title=Kali Linux 2024.4 Release (Python 3.12, Goodbye i386, Raspberry Pi Imager & Kali NetHunter) |url=https://www.kali.org/blog/kali-linux-2024-4-release/ |access-date=December 23, 2024 |website=Kali.org |publisher=Kali Linux Blog}}
Requirements
- A minimum of 20GB hard disk space for installation, depending on the version. Version 2020.2 requires at least 20GB.
- A minimum of 2GB RAM for i386 and AMD64 architectures.
- A CD-DVD drive, USB stick or other bootable media.
- A minimum of an Intel Core i3 or an AMD E1 processor for good performance.
The recommended hardware specification for a smooth experience are:
Supported platforms
Kali Linux is currently distributed as a 64-bit images for use on hosts based on the x86-64 architecture and as an image for the ARM architecture for use on the Beagle Board computer and Samsung's ARM Chromebook.{{cite web |url=https://www.itnews.com.au/news/backtrack-successor-kali-launched-336420 |title=BackTrack successor Kali Linux launched |publisher=SC Magazine |first=Darren |last=Pauli |date=March 13, 2013 |access-date=April 10, 2019 |archive-date=April 10, 2019 |archive-url=https://web.archive.org/web/20190410145830/https://www.itnews.com.au/news/backtrack-successor-kali-launched-336420 |url-status=live }} With the release of 2024.4, 32-bit images based on the i386 architecture were officially dropped.{{Cite web |date=November 7, 2024 |title=Installing old i386 images |url=https://www.kali.org/docs/installation/installing-old-i386/ |url-status=live |archive-url=https://web.archive.org/web/20241217201254/https://www.kali.org/docs/installation/installing-old-i386/ |archive-date=December 17, 2024 |access-date=December 23, 2024 |website=Kali.org}}
The developers of Kali Linux aim to make Kali Linux available for more ARM devices.{{cite web |url=https://lifehacker.com/behind-the-app-the-story-of-kali-linux-1666168491 |title=Behind the App: The Story of Kali Linux |publisher=Lifehacker |last=Orin |first=Andy |date=December 3, 2014 |access-date=April 10, 2019 |quote=Mati Aharoni: One of our goals with Kali is to provide images of the operating system for all sorts of exotic hardware—mainly ARM based. This includes everything from Raspberry Pi's to tablets, to Android TV devices, with each piece of hardware having some unique property. |archive-date=October 20, 2021 |archive-url=https://web.archive.org/web/20211020145254/https://lifehacker.com/behind-the-app-the-story-of-kali-linux-1666168491 |url-status=live }}
Kali Linux is already available for Asus Chromebook Flip C100P, BeagleBone Black, HP Chromebook, CubieBoard 2, CuBox, CuBox-i, Raspberry Pi, EfikaMX, Odroid U2, Odroid XU, Odroid XU3, Samsung Chromebook, Utilite Pro, Galaxy Note 10.1, and SS808.{{cite web |url=https://docs.kali.org/category/kali-on-arm |title=04. Kali Linux on ARM |access-date=September 4, 2019 |archive-date=November 25, 2019 |archive-url=https://web.archive.org/web/20191125074926/https://docs.kali.org/category/kali-on-arm |url-status=live }}
With the arrival of Kali NetHunter, Kali Linux is also officially available on Android devices such as the Nexus 5, Nexus 6, Nexus 7, Nexus 9, Nexus 10, OnePlus One, and some Samsung Galaxy models. It has also been made available for more Android devices through unofficial community builds.
Kali Linux is available on Windows 10, on top of Windows Subsystem for Linux (WSL). The official Kali distribution for Windows can be downloaded from the Microsoft Store.{{cite web |url=https://www.kali.org/news/kali-linux-in-the-windows-app-store/ |title=Kali Linux in the Windows App Store |date=March 5, 2018 |access-date=April 10, 2019 |publisher=Kali Linux |author=muts |archive-date=January 23, 2021 |archive-url=https://web.archive.org/web/20210123112647/https://www.kali.org/news/kali-linux-in-the-windows-app-store/ |url-status=live }}
Comparison with other Linux distributions
Kali Linux is developed with a focus towards cyber security experts, penetration testers, and white-hat hackers. There are a few other distributions dedicated to penetration testing, such as Parrot OS, BlackArch, and Wifislax. Kali Linux has stood out against these other distributions for cyber security and penetration testing,{{Cite web |last=Gray |first=Lerma |title=11 Best Linux Distros For Hacking And Penetration Testing in 2021 – dev.Count |date=February 12, 2021 |url=https://devcount.com/linux-distros-hacking/ |access-date=May 2, 2022 |language=en-US |archive-date=May 21, 2022 |archive-url=https://web.archive.org/web/20220521054325/https://devcount.com/linux-distros-hacking/ |url-status=live }} as well as having features such as the default user being the superuser in the Kali Live Environment.{{Cite web |title=Kali's Default Credentials {{!}} Kali Linux Documentation |url=https://www.kali.org/docs/introduction/default-credentials/ |access-date=May 2, 2022 |website=Kali Linux |language=English |archive-date=April 15, 2022 |archive-url=https://web.archive.org/web/20220415133516/https://www.kali.org/docs/introduction/default-credentials/ |url-status=live }}
Tools
Kali Linux includes security tools, such as:{{Cite web |title=Burp Suite - Application Security Testing Software |url=https://portswigger.net/burp |access-date=September 29, 2023 |website=portswigger.net |archive-date=September 22, 2003 |archive-url=https://web.archive.org/web/20030922083022/https://portswigger.net/burp |url-status=live }}{{Cite web |title=BeEF - The Browser Exploitation Framework Project |url=https://beefproject.com/ |access-date=September 29, 2023 |website=beefproject.com |archive-date=September 26, 2023 |archive-url=https://web.archive.org/web/20230926045927/https://beefproject.com/ |url-status=live }}{{Cite web |title=cisco-global-exploiter {{!}} Kali Linux Tools |url=https://www.kali.org/tools/cisco-global-exploiter/ |access-date=September 29, 2023 |website=Kali Linux |language=English |archive-date=October 1, 2023 |archive-url=https://web.archive.org/web/20231001050707/https://www.kali.org/tools/cisco-global-exploiter/ |url-status=live }}{{Cite web |title=sqlmap: automatic SQL injection and database takeover tool |url=https://sqlmap.org/ |access-date=September 29, 2023 |website=sqlmap.org |archive-date=September 19, 2008 |archive-url=https://web.archive.org/web/20080919035810/https://sqlmap.org/ |url-status=live }}{{Cite web |title=WPScan: WordPress Security Scanner |url=https://wpscan.com/ |access-date=September 29, 2023 |website=wpscan.com |language=en |archive-date=September 29, 2023 |archive-url=https://web.archive.org/web/20230929082632/https://wpscan.com/ |url-status=live }}{{Citation |title=Reverse Engineer's Toolkit |date=September 28, 2023 |url=https://github.com/mentebinaria/retoolkit |access-date=September 29, 2023 |publisher=Mente Binária |archive-date=October 4, 2023 |archive-url=https://web.archive.org/web/20231004182747/https://github.com/mentebinaria/retoolkit |url-status=live }}{{Citation |last=dev-gsniper |title=Reverse-Engineering-toolkit |date=September 27, 2023 |url=https://github.com/geeksniper/reverse-engineering-toolkit |access-date=September 29, 2023 |archive-date=September 27, 2023 |archive-url=https://web.archive.org/web/20230927012634/https://github.com/geeksniper/reverse-engineering-toolkit |url-status=live }}{{Cite web |title=Vulnerable By Design ~ VulnHub |url=https://www.vulnhub.com/ |access-date=September 29, 2023 |website=www.vulnhub.com |language=en |archive-date=September 29, 2023 |archive-url=https://web.archive.org/web/20230929033324/https://vulnhub.com/ |url-status=live }}
{{div col|colwidth=13em}}
- Aircrack-ng
- Autopsy
- Armitage
- Burp Suite
- BeEF
- Cisco Global Exploiter
- Ettercap
- Foremost
- Hydra
- Hashcat
- John the Ripper
- Kismet
- Lynis
- Maltego
- Metasploit framework
- Nmap
- Nikto
- OWASP ZAP
- Reverse engineering toolkit
- Social engineering tools
- Sqlmap
- Volatility
- VulnHub
- Wireshark
- WPScan
{{div col end}}
These tools can be used for a number of purposes, most of which involve exploiting a victim network or application, performing network discovery, or scanning a target IP address. Many tools from the previous version (BackTrack) were eliminated to focus on the most popular and effective penetration testing applications.
Offensive Security provides a book, Kali Linux Revealed,{{Cite book|last1=Hertzog|first1=Raphael|url=https://books.google.com/books?id=6n9atAEACAAJ|title=Kali Linux Revealed: Mastering the Penetration Testing Distribution|last2=O'Gorman|first2=Jim|last3=Aharoni|first3=Mati|date=June 5, 2017|publisher=Offsec Press|isbn=978-0-9976156-0-9|language=en|access-date=March 17, 2020|archive-date=May 21, 2024|archive-url=https://web.archive.org/web/20240521132906/https://books.google.com/books?id=6n9atAEACAAJ|url-status=live}} and makes it available to download with a subscription.{{Cite book|url=https://kali.training/downloads/Kali-Linux-Revealed-1st-edition.pdf|title=Kali Linux Revealed |access-date=March 17, 2020 |archive-date=January 2, 2021 |archive-url=https://web.archive.org/web/20210102180929/https://kali.training/downloads/Kali-Linux-Revealed-1st-edition.pdf|url-status=dead}}
Kali Purple
Kali Purple is a flavor of Kali introduced in 2023 specifically designed for defensive security.{{Cite web |last=Abrams |first=Lawrence |date=March 13, 2023 |title=Kali Linux 2023.1 introduces 'Purple' distro for defensive security |url=https://www.bleepingcomputer.com/news/security/kali-linux-20231-introduces-purple-distro-for-defensive-security/ |url-status=live |archive-url=https://web.archive.org/web/20241214224342/https://www.bleepingcomputer.com/news/security/kali-linux-20231-introduces-purple-distro-for-defensive-security/ |archive-date=December 14, 2024 |access-date=December 14, 2024 |website=BleepingComputer |language=en-us}} It features its own suite of tools sorted into categories that correspond to the NIST Cybersecurity Framework.{{Cite web |last=codelabs |date=March 14, 2023 |title=What is Kali Purple and How Is It Used? - TCM Security |url=https://tcm-sec.com/kali-purple-v2023-1/ |url-status=live |archive-url=https://web.archive.org/web/20241214224610/https://tcm-sec.com/kali-purple-v2023-1/ |archive-date=December 14, 2024 |access-date=December 14, 2024 |website=TCM Security |language=en-US}}
See also
{{Portal|Free and open-source software|Computer programming|Linux}}
References
{{Reflist}}
External links
- {{Official website|https://www.kali.org}}
{{Linux-distro}}
{{Authority control}}
Category:ARM operating systems
Category:Debian-based distributions
Category:Digital forensics software
Category:Operating system distributions bootable from read-only media
Category:Pentesting software toolkits