Kali Linux is not Linux for beginners, but a powerful weapon for hackers or those who fight these hackers. Kali Linux is a great distribution for intrusion testing and security auditing. Kali Linux contains several hundred tools designed to address a variety of information security challenges, such as intrusion testing, security research, forensics, and reverse engineering. Kali Linux is a multi-platform solution that is freely available to professionals and amateurs. The official website has the following description of the distribution: “Penetration Testing and Ethical Hacking Linux Distribution” or in our way a distribution for penetration testing and ethical hacking. Simply put, this distribution contains many security-related tools and networks that target computer security experts. default. Kali Linux does not provide anything unique in this regard.
Most programs can simply be installed in any other distribution, or even in Windows. The difference between Kali Linux is that it is filled with such tools and settings that are needed for security testing, and not for normal operation of the average user. If you want to use Kali instead of the main distribution, you are making a mistake. It is a specialized distribution to solve a certain range of tasks, which means that solving tasks for which it was not intended will be more difficult, for example, the same search for programs. Kali Linux’s capabilities focus on security testing.
Launch VMware. In the window that opens, click on Create a New Virtual Machine
By clicking on Browse… we select the path to our .iso file with the Kali Linux distribution. You can download it from the official website, selecting Bare Metal.
After that, click the Next button.
Since VMware does not recognize the distribution on its own, we manually select Linux, Debian 10.x64 bit.
At the time of writing, Kali linux is using Linux 5.16 kernel with Debian patches.
Click on the Next button
In the next window, we are offered to rename the virtual machine and change the location where its files will be stored. If you plan to use more than one in the future, it’s a good idea to give them unique names so you don’t get confused.
Attention! We need at least 20GB of disk space for the virtual machine to work properly. It is better to choose a disk in advance, which will be free. For full-fledged work on Kali, I advise you to allocate 50 GB of disk space. When finished, click on Next again
In the next window, we can change the settings by clicking Customize Hardware, or confirm everything by clicking Finish
After creating a virtual machine, we can see it in the list. To launch – double-click its name or click on Play virtual machine.
After starting, select Graphical Install using the keyboard
In the next window, select the language convenient for you and click Continue
Depending on the selected language, the region will be suggested for setting the time zone and localization of the system. (you can select another by clicking the other button)
Select the language encoding.
We select the keyboard layout and wait a while while the system configures itself
Network configuration. In our case, the computer is connected to the network directly with a network cable. Further installation when connected via Wi-Fi or in the absence of a network may be slightly different. (In the case of Wi-Fi, it will ask you to connect, and if there is no network, then why do we need Linux at all?)
But there is a small chance that your network device is missing drivers and will have to be installed manually. With a very small probability, drivers for Linux will be completely absent for your network device.
Select a hostname and click Continue
Domain name. Who knows what it is and why it is necessary – they introduce it. Who does not know, just skip and click on Continue
In this window that opens, you are asked to enter your real username. It will be used to send mail and more. You can enter anything
Enter the administrator account name. The main thing is not to forget that you entered it, as in Windows they will not prompt you at the authorization window
Enter a fictitious password twice and click on Continue
Disk layout. We leave everything in this menu as it is and press Continue. Do the same for the next 3 windows
If there is no desire to change anything in the previous points of disk partitioning, select Yes (according to writing changes to disk) and click on Continue. It will take some time to save the changes to disk. You can safely brew tea with cookies.
The next window with the choice of the shell of the operating system and a set of software. I advise you to leave everything as it is and click on Continue
This window asks us whether to install the Gurub bootloader. Leave the Yes label and click Continue.
.If you want to change the location of the bootloader, you can do so in the window. If you don’t even know what it is, select /dev/sda/ and click Continue.
The system tells us that it is installed and asks us to reboot. Click Continue
Congratulations! If everything was done correctly, after rebooting you will see an authorization window in the system!