***Warning:*** Obtaining unauthorized access to another's computer system or systems is illegal under the [link|https://www.nacdl.org/Landing/ComputerFraudandAbuseAct|Computer Fraud & Abuse Act]. |
|
The following guide was made with the purpose of educating others on cyber security tools, technologies, and techniques with the intention of educating others on better protecting their own technologies and data. ***Please use the knowledge gained from this guide responsibly.*** |
|
This guide will demonstrate how a user can install Kali Linux onto the VMware virtual machine software. |
|
=== Why do people choose Kali Linux? === |
Kali Linux is one of the most preferred operating systems to preform cyber security and information security tasks due to the following reasons: |
|
* Kali Linux offers more than 600 penetration testing tools from various fields of information security and forensics. |
* Kali Linux is highly customizable, which allows for a great deal of versatility in features. |
* Multilingual support |
* Kali Linux supports a wide range of wireless devices |
* Custom kernel which can be patched for injections |
* Completely free and open source |
=== Different ways to install Kali === |