Friday, April 19, 2024

Powerful Penetration Testing Distro Kali Linux Now available in Windows 10

Kali Linux one of the most powerful penetration testing Distro is now available Via Windows Store. To deploy Kali Linux in windows you should enable the optional feature Windows Subsystem for Linux (WSL).

But still, now it is not fully optimal due to various environment restrictions and some of the packages detected as hack tools and exploits by Windows Defender.

Must Read Complete Kali Tools tutorials from Information gathering to Forensics

The Kali Linux is the world’s most capable and famous security testing platform, utilized by security experts in an extensive variety of specializations, including penetration testing, forensics, reverse engineering, and vulnerability assessment.

Recommended reviewing our Kali Linux Tutorials page which covers dozens of Kali Linux Tools.

How to Setup Environment – Kali Linux in windows

Enable the optional feature “Windows Subsystem for Linux” using the following PowerShell command and restart your computer.

Enable-WindowsOptionalFeature -Online -FeatureName Microsoft-Windows-Subsystem-Linux

In the next step, you can select your target distribution and click “Get”, once the download completed select “Launch” and it will open the console window.

Microsoft published the advisory to Install the Windows Subsystem for Linux.

Once the installation completed it is always recommended to Upgrade by using following Commands.

apt update
apt dist-upgrade
reboot

Like Kali Linux, there are some top Penetration Testing & Ethical Hacking Linux Distributions you can see them here.

Website

Latest articles

Alert! Windows LPE Zero-day Exploit Advertised on Hacker Forums

A new zero-day Local Privilege Escalation (LPE) exploit has been put up for sale...

Palo Alto ZeroDay Exploited in The Wild Following PoC Release

Palo Alto Networks has disclosed a critical vulnerability within its PAN-OS operating system, identified...

FIN7 Hackers Attacking IT Employees Of Automotive Industry

IT employees in the automotive industry are often targeted by hackers because they have...

Russian APT44 – The Most Notorious Cyber Sabotage Group Globally

As Russia's invasion of Ukraine enters its third year, the formidable Sandworm (aka FROZENBARENTS,...

SoumniBot Exploiting Android Manifest Flaws to Evade Detection

A new banker, SoumniBot, has recently been identified. It targets Korean users and is...

LeSlipFrancais Data Breach: Customers’ Personal Information Exposed

LeSlipFrancais, the renowned French underwear brand, has confirmed a data breach impacting its customer...

Cisco Hypershield: AI-Powered Hyper-Distributed Security for Data Center

Cisco has unveiled its latest innovation, Cisco Hypershield, marking a milestone in cybersecurity.This groundbreaking...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

WAAP/WAF ROI Analysis

Mastering WAAP/WAF ROI Analysis

As the importance of compliance and safeguarding critical websites and APIs grows, Web Application and API Protection (WAAP) solutions play an integral role.
Key takeaways include:

  • Pricing models
  • Cost Estimation
  • ROI Calculation

Related Articles