Table of Contents

Join Our Membership To Start Your Cybersecurity Journey Today!

Kali Linux Tutorial

Introduction to Kali Linux

Kali Linux is a Debian-based Linux distribution designed for penetration testing, forensics and security auditing. It comes pre-installed with hundreds of security tools and is maintained by Offensive Security. In this tutorial, we’ll guide you through installing Kali Linux on Windows using VirtualBox, allowing you to run it safely in a virtual environment and a comprehensive kali Linux tutorial later.

Phase 1: Virtual Environment Setup

Step 1: Download VirtualBox

VirtualBox is a free, open-source virtualization software that allows you to run multiple operating systems on a single machine.

Visit the VirtualBox website virtualbox.org

Click on “Downloads”

Click on “Windows hosts”

Download the installer. The download should automatically begin. Save the file to a location you can easily access

Step 2: Install VirtualBox

  • Run the installer:
    • Navigate to your Downloads folder
    • Double-click on the VirtualBox installer

  • Follow the installation wizard:
  • Click “Next” on the welcome screen
  • Choose your installation location (default is recommended)
  • Select the components to install (keep all defaults)
  • Click “Install” and wait for the process to complete
  • Click “Finish” when installation completes
    • VirtualBox should launch automatically

Step 3: Download Kali Linux ISO

Step 4: Set Up Kali Linux Virtual Machine

  • Now Click on below button to start the machine

  • And here is the login screen

  • And we are ready to rock n roll into our Kali Linux Tutorial about understanding Kali next

Phase 2: Understanding Kali Linux

Section 1: Introduction to Kali Linux

What is Kali Linux?

As described earlier, Kali Linux is a Linux distribution designed specifically for digital forensics, penetration testing, and security auditing. Think of Kali Linux as a security toolkit rather than a general-purpose operating system. Unlike standard Linux distributions focused on daily computing, Kali is purpose-built with one primary objective: to provide security professionals with all the tools they need in a single, cohesive platform. Kali follows several core principles that define its approach

Who Uses Kali Linux?

Kali serves a diverse range of professionals across multiple sectors:

Penetration testers use Kali to:

Security Operations Center (SOC) teams use Kali for:

Academics and independent researchers utilize Kali to:

Common Misconceptions About Kali Linux

Many people hold incorrect beliefs about Kali Linux, often shaped by how it’s portrayed in the media or misunderstood by beginners. Let’s clarify four of the most common ones:

Section 2: Navigating the Kali Linux Desktop Environment

Kali uses the XFCE desktop environment, which is lightweight, customizable, and perfect for security work. When you first log in, you’ll see a clean desktop with several key elements you should know.

Key Desktop Elements Explained

Application Menu (Top-left corner)

This is your main gateway to all tools. Click here to access the categorized menu containing all Kali Linux applications, system settings, and utilities. Security tools are neatly organized into groups like “Reconnaissance” “Resource Development” and “Privilege Escalation.”

Quick Launch Icons (Top panel)

System Tray Area (Top-right corner)

Section 4: Important First Few Tasks: Configure Your Kali Linux With Best Practices

Before you start exploring, it’s crucial to update your Kali installation. Updates include security patches, new tool versions, and bug fixes.

Open a terminal (click the terminal icon) and run these commands in order:

  • Refresh the package list

  • Upgrade the installed packages – this will be time taking depending upon your internet connection bandwidth

  • To upgrade Kali Kernel and firmware
    • sudo apt dist-upgrade -y

The next step should be to change the default password which was just “kali” when we created this VM. To change the password, we use “passwd” command in the terminal. If you check below output

  • The first output is when you don’t change the passwords i.e. you use same old password
  • The second output is when you do not provide any password and simply keep pressing enter
  • The third output is when you provide different passwords in both fields

Section 3: System Management Basics – Understanding systemd

Before diving into security tools, it’s important to understand how Linux services are managed. Kali Linux, like most modern Linux distributions, uses systemd as its init system and service manager.

What is systemd?

systemd is the background process that starts and manages all other processes on your system.It starts services at boot, manages dependencies between services, handles logging, and controls system states.

Why systemd Matters in Kali

Many security tools run as services in the background. For example:

Knowing how to control these services is essential for effective security work.

Using systemctl – The Control Command

systemctl is your main tool for interacting with systemd. Here are the essential commands:

Example 1: Managing the SSH Service

Let’s say you want to use SSH to access your Kali machine remotely then

  • First check if ssh is enabled

  • Then run below to start ssh service that requires the password.

  • Then if we check the status again, we can see that its enabled and running now

  • Similarly we can run below commands to stop/restart systemd services
    • systemctl stop ssh
    • systemctl restart ssh

Using journalctl – The Log Viewer

journalctl reads systemd’s centralized logging system. This is crucial for troubleshooting when services don’t work properly.

Investigating Service Issues

If a service like ssh fails to start, you can use journalctl command to read the logs. Lets say we recently enabled ssh then lets read about its logs a bit. Below output shows if there is no service with the provided name, you get different message than logs.

Helpful journalctl options:

Section 4: Introduction to Built-in Tools

Now let’s explore one of Kali’s most important built-in tools i.e. Wireshark. This is a network protocol analyzer, which means it lets you see what’s happening on your network. Think of it as a “listening device” for network traffic.

What is Wireshark Used For?

Security professionals use Wireshark to:

Starting Wireshark

There are two main ways to start Wireshark:

Method 1: From the Desktop Menu

Method 2: From Terminal

Open a terminal and type “wireshark”

First Look at Wireshark

When Wireshark opens, you’ll see:

Capturing Your First Network Traffic

Step 1: Choose an interface

For this exercise, we will select “any”

Step 2: Start capturing

Step 3: Generate some traffic
While Wireshark is running:

Step 4: Stop capturing
Click the red square button at the top to stop

Understanding What You See

After stopping, you’ll see three main sections:

Basic Filtering

You don’t need to look at all the packets. Use filters to see only what you need.

To see only HTTP traffic:
Type
http in the filter box (top bar) and press Enter

Filters help you find specific packets quickly. Type these in the filter bar (green area at the top):

For a more complete list you can view the wireshark cheat sheet.

Section 5: Installing Third-Party Tools in Kali

While Kali comes with hundreds of pre-installed tools, you’ll often need to install additional software. Let’s learn how to add some useful third-party tools to your setup.

Why Install Extra Tools?

Kali includes security-focused tools, but you might need:

Before You Start: Update First

Always update before installing new software:

  • sudo apt update
  • sudo apt upgrade -y

1. Installing Code Editors

code-oss

It is a popular code editor with great extensions for security work.

Installation steps and more here https://www.kali.org/tools/code-oss/

Command to install “sudo apt install code-oss”

2. Installing Privilege Escalation Tools

  • LinPEAS is the abbreviation of Linux Privilege Escalation Awesome Script
  • LinPEAS automates finding privilege escalation paths on Linux systems

Installation and the steps are in detail here https://www.kali.org/tools/peass-ng/

Command to install “sudo apt install peass”

3. Installing System Monitoring Tools

htop is the Interactive Process Viewer which is better than the default top command for monitoring system resources. Just type htop and if your system does not have it, the system will ask to install it.

Section 6: Where to Go Next After This Kali Linux Tutorial – Learning Paths and Advanced Topics

Now that you’re comfortable with Kali basics, here are learning paths to expand your skills. Each area below has specific resources to help you master different aspects of cybersecurity.

Command Line Mastery

Essential terminal skills for efficient security work

Password Security and Cracking

Learning below tools will help in understanding password vulnerabilities and testing methodologies

Web Application Security

Below tools will help in testing websites and web applications for vulnerabilities.  Testing them on vulnerable web applications like the Damn Vulnerable Web Application (DVWA) will generate some great vulnerability findings for you to look at.

Network Vulnerability Assessment

To find weaknesses in networks and systems

Network Traffic Analysis

Intercepting and understanding network communications

Enterprise Environment Security

Testing Active Directory and corporate networks

Kali Linux Tutorial Final Thoughts

Remember that learning cybersecurity is a journey, not a destination. Start with the fundamentals, practice regularly in safe environments, and always follow ethical guidelines. Each tool you master makes you more effective at securing systems and understanding digital defenses.

The key to becoming skilled isn’t just knowing tools exist, but understanding when and how to use them responsibly.

Scroll to Top