Overview
What is Kali Linux?
Kali Linux is an open source, advanced penetration testing platform supported by Offensive Security headquartered in New York.
TrustRadius Insights
Kali, the cybersecurity sidekick
Kali Linux a great security toolkit
It's the best OS for any IT infrastructure enthusiast
Great OS for closing all security holes.
Must tool for PT. nuff said !
Reviewer Pros & Cons
Pricing
What is Kali Linux?
Kali Linux is an open source, advanced penetration testing platform supported by Offensive Security headquartered in New York.
Entry-level set up fee?
- No setup fee
Offerings
- Free Trial
- Free/Freemium Version
- Premium Consulting/Integration Services
Would you like us to let the vendor know that you want pricing?
7 people also want pricing
Alternatives Pricing
What is Pentest-Tools.com?
Pentest-Tools.com allows users to discover and report vulnerabilities in websites and network infrastructures. They provide a set of integrated pentesting tools designed to enable users to perform easier, faster, and more effective pentest engagements. Quickly discover the attack surface of a…
Product Demos
Python Brute Force Password hacking (Kali Linux SSH)
Linux deploy full demo with installing kali linux & all error fixed (part 1)
Extract iPhone and Android EXIF metadata from online photos using PYTHON // OSINT with Kali Linux
Product Details
- About
- Tech Details
What is Kali Linux?
Kali Linux Technical Details
Operating Systems | Unspecified |
---|---|
Mobile Application | No |
Comparisons
Compare with
Reviews and Ratings
(29)Community Insights
- Business Problems Solved
- Recommendations
Kali Linux has been widely utilized by users for various purposes. It serves as a valuable tool for building test labs and testing network security. Network engineers and pentesters find Kali Linux particularly useful as it provides a wide range of tools and utilities for performing real-life network scans and analyzing network traffic. The system offers features to check for and prevent malicious traffic from infiltrating networks using the Linux firewall 'iptables'. Security-conscious SaaS companies rely on Kali Linux's security tools like Nmap, OWASP's ZAP, BURP, and more to conduct regular security scans, ensuring their servers are up to date and properly configured. Consulting companies and their clients also utilize Kali Linux for high-security testing across different departments. With its preinstalled security-focused tools, Kali Linux proves to be an excellent operating system choice for security consultants and specialists. Additionally, the software enables organizations to validate application vulnerabilities, perform random testing, and simulate training scenarios to familiarize new hires with company security policies and practices.
Users who have experience with Linux as an operating system for cybersecurity professionals highly recommend Linux to colleagues, friends, testers, ethical hackers, security analysts, network admins, bug and vulnerability analysts. They suggest starting with other Linux distributions before using Linux for beginners to ensure a smoother transition. Additionally, they emphasize the importance of going through the official website documentation of Linux thoroughly before installing and configuring it. These recommendations can help individuals in the cybersecurity field learn and practice ethical hacking, network testing, and programming effectively.
Attribute Ratings
Reviews
(1-5 of 5)Kali, the cybersecurity sidekick
- Analyzing SSL certificates
- Analyzing SSL server configurations
- Vulnerability scanning
- Port scanning
- Kali is a collection of tools, so the documentation is fragmented. It would be nice to have more centralized docs.
- Analyzing SSL certs to verify they are installed correctly
- Analyzing SSL configuration on servers to confirm correct ciphers are enabled
- Scanning our web servers for vulnerabilities as part of our regular security testing
- Scanning wordpress sites to identify out of date plugins and other potential security issues.
- Running port scans on our servers to make sure only certain ports are open
- Verifying SSL certificates
- Confirming SSL configurations
- Scanning web sites for potential vulnerability issues
- Almost entirely positive. It's an indispensable tool in cybersecurity.
Kali Linux a great security toolkit
- logical and intuitive interface
- come with over 600 useful tools
- built Linux Debian distribution
- GIU interfaces for some tools
- Kali is mostly CLI based and requires knowledge of the CLI commands
- Network Scans
- Traffic analysis
- Pen testing
- Identifying weaknesses before they become a problem
- Hardening a Corporate or Home network
- Port analyses
- Hosting any website
- Using system as a proxy server
- More secure than Windows
- To make the Graphical interface more interactive, because Linux distros are more tend to be used in CLI.
- Penetration Testing
- System Admin
- Syslog analyses
- Network Admin.
- Web Hosting
- GUI is not so interactive.
- Proxying
- Making as a Server
- Port Analyses
- Scanning
- Enumeration in binary , hex , or octal or even in ascii every tools are available
- Till now Kali Linux have not made a single penny negative impact on our companies business , its so powerful and useful at the same time for our company.
- Network Analyses
- Web Hosting
- networking
- Pentesting
- Admins
- Hosting
- networking
- networking
Great OS for closing all security holes.
- Provides high security.
- Does great job with penetration testing.
- Has good number of testing tools with in.
- Usage wise, it is tough for use by beginners. Can be improved.
- With Kali Linux have noticed driver related issues especially with Nvidia graphics cards.
- Kali Linux can be improved for use as a day to day OS.
- High number of inbuilt testing tools.
- Good for penetration testing of in house applications.
- Capable of knowing and creating back doors with in an application.
- Initial stages of figuring out back doors in an application hence making them secure.
- ROI is good as it reduces in production security threats by letting us know well in advance.
- Entire development team along with its designers get a huge sigh of relief as all security holes are sealed well in advance before going into production.
Must tool for PT. nuff said !
- Open source
- Suite of tools for PT
- NEtHunter
- Support for forensic
- Network vulnerabilities
- Windows support
- Pen testing
- Vulnerabilities scanning
- Multi environs
- Costs
- Time taken to setup
- Configurations needed for each use