pip is the package manager for the Python coding language. It can be installed on a Linux system and then used on the command line to download and install Python packages and their requisite dependencies.

Python is a common language to use for hacking scripts, and on Kali Linux, the biggest use for pip would be to install needed dependencies for Python hacking programs. Whether you are developing your own script or trying to execute a third party Python program, having pip on your system will allow you to install dependency packages very easily.

In this guide, we'll show you how to install pip for Python 3 on Kali. We'll also show you basic usage commands for pip, such as installing and removing software packages. pip operates much like Kali's package manager, which you're probably already familiar with.

In this tutorial you will learn:
  • How to install pip on Kali
  • Basic usage commands for pip
pip3 on Kali Linux
pip3 on Kali Linux

The objective of this guide is to show the default username and password for Kali Linux. The guide will be applicable for persistent installations, as well as the live CD image and Kali virtual machine downloads in VirtualBox or VMware.

In this tutorial you will learn:
  • Default username and password for Kali
  • How to execute Linux commands with administrative root privileges
  • How to change to root shell
  • How to change user and root passwords
Default user and password for Kali Linux
Default user and password for Kali Linux

Kali Linux is a powerful Linux distro for penetration testing and ethical hacking. It's not meant as an everyday operating system, so most Kali users will utilize the distro by running it temporarily from a USB drive, or opt for a persistent installation in a virtual machine.

Installing Kali in VMware gives you easy access to the hundreds of security and hacking tools that are included with Kali. Any time you need to do some packet sniffing, password cracking, etc. you can simply fire up the virtual machine and get to work. It's also a great way to test out hacking applications without having to install software on your host system.

In this tutorial, we'll show you how to install Kali Linux in a VMware virtual machine. You'll be able to follow along with this guide regardless of your host operating system, so both Linux and Windows users will find these step by step instructions to be applicable.

In this tutorial you will learn:
  • How to configure VMware to host Kali Linux
  • How to create a Kali Linux virtual machine
Running Kali Linux inside a VMware virtual machine
Running Kali Linux inside a VMware virtual machine

Kali Linux already comes with a lot of ethical hacking and penetration tools out of the box. There are even more tools available from package repositories, but sifting through hundreds of tools and finding the ones you want to install can be challenging.

We aim to make the task easier in this guide, by showing you how to search for more software and install the tools on your system. If Kali doesn't include some of your favorite tools by default, or you just want to browse the selection of software to see what else might be available, the steps below will help you find useful tools to install.

In this tutorial you will learn:
  • How to search for packages with apt-cache
  • How to search for packages with aptitude
  • GUI software installers
  • How to search for Kali packages online
Searching for packages to install on Kali Linux
Searching for packages to install on Kali Linux

Vulnerabilities in WordPress can be uncovered by the WPScan utility, which comes installed by default in Kali Linux. It's also a great tool for gathering general reconnaissance information about a website that's running WordPress.

Owners of WordPress sites would be wise to try running WPScan against their site, as it may reveal security issues that need patched. It can also reveal more general web server issues, such as directory listings that haven't been turned off inside Apache or NGINX.

WPScan itself is not a tool that can be used maliciously while performing simple scans against a site, unless you consider the extra traffic itself to be malicious. But the information it reveals about a site can be leveraged by attackers to launch an attack. WPScan can also try username and password combinations to try and gain access to a WordPress site. For this reason, it's advised that you only run WPScan against a site that you own or have permission to scan.

In this guide, we'll see how to use WPScan and its various command line options on Kali Linux. Try out some of the examples below to test your own WordPress installation for security vulnerabilities.

In this tutorial you will learn:
  • How to use WPScan
  • How to scan for vulnerabilities with API token

Kali Linux and Parrot OS are two Linux distributions with a huge focus on cybersecurity, privacy, and penetration testing.

Both distributions are based on Debian Linux, naturally making them pretty similar. This fact, along with a big overlap in target audience, causes a lot of newcomers to question the difference between the two distributions.

In this guide, we'll be comparing the two distributions across a few key areas and giving a brief review of both distros. Read on to learn more about Kali Linux and Parrot OS and how they compare. By the end of this article, you'll be armed with enough information to choose the best distro for your needs.

In this tutorial you will learn:
  • Kali Linux and Parrot OS background information
  • Kali Linux and Parrot OS similarities and differences
  • Which distro should I use, Kali Linux or Parrot OS?

Out of the box, the only option for installing software on Kali Linux is to use the APT package manager from the command line, or download software directly from a developer's website.

This minimal approach can be appreciated, but sometimes it's just more convenient to use a GUI software mananger application to install programs. In this guide, we'll see how to install two different GUI software managers on Kali Linux, which can then be used to search for other software to install.

In this tutorial you will learn:
  • How to install Software Center on Kali
  • How to install Synaptic Package Manager on Kali
  • How to use Software Center or Synaptic to install software
Software Center and Synaptic running on Kali Linux
Software Center and Synaptic running on Kali Linux

Kali Linux is not your typical Linux distribution. It has a very specific use case, and that is to provide the user with penetration testing and ethical hacking tools. For other most popular Linux distributions please visit our dedicated linux download page.

Under the hood, Kali Linux runs much like Debian, on which it is based. However, Kali should not be used as an ordinary operating system; it has a specific purpose in penetration testing and security auditing and should be used strictly for that.

For years, TrueCrypt was the gold standard in encrypting drives across platforms. TrueCrypt is gone now, but VeraCrypt is carrying on its legacy. It looks and works a lot like TrueCrypt did, and it's compatible with TrueCrypt partitions.

Even though VeraCrypt isn't available in Kali's repositories, but that doesn't mean that it's difficult to install. You can download the VeraCrypt installer right from the developers and use it to get set up on Kali.

In this tutorial you will learn:
  • How to Download and Unpack The Tarball.
  • How to Run the VeraCrypt Install Script.

The objective of this short guide is to explain how to enable autologin on Kali Linux with step by step instructions.

In this tutorial you will learn:
  • How to identify what is your system's default Display Manager.
  • How to edit an appropriate configuration file to enable autologin on Kali Linux.

The following guide will provide the readers with information on how to update/upgrade the Kali Linux system.

In this tutorial you will learn:
  • How to configure Kali Linux repositories
  • How to update Kali Linux
  • How to upgrade kept back packages
  • How to uninstall no longer required packages

Symptoms

Unable to use standard Kali Linux provided repository for updating the Kali Linux system as well for new software installations.

The following error message appears when attempting to run the apt update command:
Err:1 http://http.kali.org/kali kali-rolling InRelease
  403  Forbidden [IP: 192.99.200.113 80]
Reading package lists... Done
E: Failed to fetch http://http.kali.org/kali/dists/kali-rolling/InRelease  403  Forbidden [IP: 192.99.200.113 80]
E: The repository 'http://http.kali.org/kali kali-rolling InRelease' is not signed.
N: Updating from such a repository can't be done securely, and is therefore disabled by default.
N: See apt-secure(8) manpage for repository creation and user configuration details.

This guide will provide you with an information on how to reset lost or forgotten root ( administrator ) password on Kali Linux.

In this tutorial you will learn:
  • How to boot Into GRUB menu on Kali Linux
  • How to edit GRUB menu
  • How to check RW permissions on the root partition
  • How to reset Kali root password and reboot the system

Objective

Download and run a Kali Linux VirtualBox image.

Distributions

This will work on any distribution running VirtualBox.

Requirements

A working Linux install with VirtualBox or root access to install VirtualBox

Difficulty

Easy

Conventions

  • # - requires given linux command to be executed with root privileges either directly as a root user or by use of sudo command
  • $ - given linux command to be executed as a regular non-privileged user

Introduction

VirtualBox is an extremely popular option for spinning up virtual machines through a graphical interface with minimal hassle. While you can install Kali Linux from scratch with VirtualBox, there's a much easier solution. Offensive Security, the developers behind Kali, provide official VirtualBox images that are ready to go immediately.

Objective

Create a Kali Linux persistent USB.

Distributions

This will work from any distribution.

Requirements

A working Linux install with root privileges. You'll also need a USB drive with at least 8GB of space.

Difficulty

Easy

Conventions

  • # - requires given linux command to be executed with root privileges either directly as a root user or by use of sudo command
  • $ - given linux command to be executed as a regular non-privileged user

Introduction

FIND LATEST LINUX JOBS on LinuxCareers.com
Submit your RESUME, create a JOB ALERT or subscribe to RSS feed.
LINUX CAREER NEWSLETTER
Subscribe to NEWSLETTER and receive latest news, jobs, career advice and tutorials.
DO YOU NEED ADDITIONAL HELP?
Get extra help by visiting our LINUX FORUM or simply use comments below.

You may also be interested in: