|Initial release||13 March 2013|
|Latest release||2019.2 / 21 May 2019|
|Update method||APT (several front-ends available)|
|Platforms||x86, x86-64, armel, armhf|
|Kernel type||Monolithic kernel (Linux)|
|Default user interface||GNOME 3|
|Official website||Official website|
Kali Linux has over 600 preinstalled penetration-testing programs, including Armitage (a graphical cyber attack management tool), Nmap (a port scanner), Wireshark (a packet analyzer), John the Ripper password cracker, Aircrack-ng (a software suite for penetration-testing wireless LANs), Burp suite and OWASP ZAP web application security scanners. Kali Linux can run natively when installed on a computer's hard disk, can be booted from a live CD or live USB, or it can run within a virtual machine. It is a supported platform of the Metasploit Project's Metasploit Framework, a tool for developing and executing security exploits.
It was developed by Mati Aharoni and Devon Kearns of Offensive Security through the rewrite of BackTrack, their previous information security testing Linux distribution based on Knoppix. The third core developer, Raphaël Hertzog, joined them as a Debian expert.
The Kali Linux project began quietly in 2012, when Offensive Security decided that they wanted to replace their venerable BackTrack Linux project, which was manually maintained, with something that could become a genuine Debian derivative, complete with all of the required infrastructure and improved packaging techniques. The decision was made to build Kali on top of the Debian distribution because it is well known for its quality, stability, and wide selection of available software.
The first release (version 1.0) happened one year later, in March 2013, and was based on Debian 7 “Wheezy”, Debian’s stable distribution at the time. In that first year of development, they packaged hundreds of pen-testing-related applications and built the infrastructure. Even though the number of applications is significant, the application list has been meticulously curated, dropping applications that no longer worked or that duplicated features already available in better programs.
During the two years following version 1.0, Kali released many incremental updates, expanding the range of available applications and improving hardware support, thanks to newer kernel releases. With some investment in continuous integration, they ensured that all important packages were kept in an installable state and that customized live images (a hallmark of the distribution) could always be created.
- Kali Linux requires a minimum of 3.8GB hard disk space for installation.
- A minimum of 512MB RAM for i386 and AMD64 architectures.
- A bootable CD-DVD drive or a USB stick.
- The recommended hardware specification for smooth run are:
- 10.0 GB of Hard Disk Space - SSD preferred
- Minimum of 2048 MB of RAM
Kali Linux is distributed in 32-bit and 64-bit images for use on hosts based on the x86 instruction set and as an image for the ARM architecture for use on the Beagle Board computer and on Samsung's ARM Chromebook.
The developers of Kali Linux aim to make Kali Linux available for even more ARM devices.
Kali Linux is already available for BeagleBone Black, HP Chromebook, CubieBoard 2, CuBox, CuBox-i, Raspberry Pi, EfikaMX, Odroid U2, Odroid XU, Odroid XU3, Samsung Chromebook, Utilite Pro, Galaxy Note 10.1, and SS808.
With the arrival of Kali NetHunter, Kali Linux is also officially available on Android devices such as the Nexus 5, Nexus 6, Nexus 7, Nexus 9, Nexus 10, OnePlus One, and some Samsung Galaxy models.
It is the first Open Source Android penetration testing platform for Nexus devices, created as a joint effort between the Kali community member "BinkyBear" and Offensive Security. It supports Wireless 802.11 frame injection, one-click MANA Evil Access Point setups, HID keyboard (Teensy like attacks), as well as Bad USB MITM attacks.
BackTrack (Kali's predecessor) contained a mode known as forensic mode, which was carried over to Kali via live boot. This mode is very popular for many reasons, partly because many Kali users already have a bootable Kali USB drive or CD, and this option makes it easy to apply Kali to a forensic job. When booted in forensic mode, the system doesn't touch the internal hard drive or swap space and auto mounting is disabled. However, the developers recommend that users test these features extensively before using Kali for real world forensics.
Kali Linux includes security tools, such as:
- Burp suite
- Cisco Global Exploiter, a hacking tool used to find and exploit vulnerabilities in Cisco Network systems
- John the Ripper
- Metasploit framework
- OWASP ZAP
- Social engineering tools.
- Reverse Engineering tools
These tools can be used for a number of purposes, most of which involve exploiting a victim network or application, performing network discovery, or scanning a target IP address. Many tools from the previous version (BackTrack) were eliminated to focus on the most popular penetration testing applications.
- "Official Kali Linux Releases". Retrieved 2019-04-10.
- "Official Kali Linux Releases". Retrieved 2019-05-21.
- "Kali Linux 1.0 review". LinuxBSDos.com. 2013-03-14. Retrieved 2019-04-10.
- Simionato, Lorenzo (2007-04-24). "Review: BackTrack 2 security live CD". Linux.com. Retrieved 2019-04-10.
- Barr, Joe. "Test your environment's security with BackTrack". Linux.com. Retrieved 2019-04-10.
- "BackTrack 4 - Hacking galore". Dedoimedo.com. 2009-05-15. Retrieved 2019-04-10.
- "BackTrack 5 R3 review". LinuxBSDos.com. 2012-08-17. Retrieved 2019-04-10.
- Watson, J.A. (2014-05-28). "Hands-on with Kali Linux 1.0.7". ZDNet.com. Retrieved 2019-04-10.
- "Kali Linux 1.0.7 review". LinuxBSDos.com. 2014-05-30. Retrieved 2019-04-10.
- "Kali Linux review". Dedoimedo.com. 2014-12-15. Retrieved 2019-04-10.
- Watson, J.A. (2016-01-22). "Hands-on with Kali Linux Rolling". ZDNet.com. Retrieved 2019-04-10.
- Smith, Jesse (2016-04-25). "Kali Linux 2016.1". DistroWatch Weekly. No. 658. Retrieved 2019-04-10.
- "Kali Linux Penetration Testing Tools". tools.kali.org. Retrieved 2019-04-10.
- "Kali Linux arrives as enterprise-ready version of BackTrack". The H. 2013-03-13. Retrieved 2019-04-10.
- "Kali Linux Metapackages". Offensive Security. Retrieved 2019-04-10.
- "The Birth of Kali Linux". Offensive Security. 2012-12-12. Retrieved 2019-04-10.
- Orin, Andy (2014-12-03). "Behind the App: The Story of Kali Linux". Lifehacker. Retrieved 2019-04-10.
Mati Aharoni: One of our goals with Kali is to provide images of the operating system for all sorts of exotic hardware—mainly ARM based. This includes everything from Raspberry Pi's to tablets, to Android TV devices, with each piece of hardware having some unique property.
- "Kali's Relationship With Debian". Kali Linux. 2013-03-11. Retrieved 2019-04-10.
- "A Bit of History". kali.training. Retrieved 2019-04-10.
- "Kali Linux Hard Disk Install". Kali Linux Official Documentation. Retrieved 2019-04-10.
- Pauli, Darren (2013-03-13). "BackTrack successor Kali Linux launched". SC Magazine. Retrieved 2019-04-10.
- "04. Kali Linux on ARM". Retrieved 2019-04-10.
- muts (2018-03-05). "Kali Linux in the Windows App Store". Kali Linux. Retrieved 2019-04-10.
- "Kali Linux NetHunter for Nexus and OnePlus". Retrieved 2019-04-10.
- "Kali Linux Forensics Mode". Retrieved 2019-04-10.