Preparing Kali linux for penetration testing/vulnerability assessment


24-Nov-2014 2-43-32 PM

We all know what Kali linux is and what it’s used for. What we need is a comprehensive guide or reminder how to install it and set it up from the scratch. And make it more powerful by adding some cool stuff such as vulnerability scanners. We don’t want to google up every step, do we?

Here is what we will cover in this blog post:

But before we do – a standard disclaimer: don’t do anything you are not authorized to do. In written!

Ok, let us begin…

1. Preparing our virtual environment
First of all, some things may work better in a physical environment. Or may not work in virtual setup at all. Some wireless stuff, perhaps. Anyhow, we will do our…

View original post 2,947 more words


Thank for your comments

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.