Thursday, October 10, 2024
HomeKALIPowerful Penetration Testing Distro Kali Linux Now available in Windows 10

Powerful Penetration Testing Distro Kali Linux Now available in Windows 10

Published on

Kali Linux one of the most powerful penetration testing Distro is now available Via Windows Store. To deploy Kali Linux in windows you should enable the optional feature Windows Subsystem for Linux (WSL).

But still, now it is not fully optimal due to various environment restrictions and some of the packages detected as hack tools and exploits by Windows Defender.

Must Read Complete Kali Tools tutorials from Information gathering to Forensics

- Advertisement - EHA

The Kali Linux is the world’s most capable and famous security testing platform, utilized by security experts in an extensive variety of specializations, including penetration testing, forensics, reverse engineering, and vulnerability assessment.

Recommended reviewing our Kali Linux Tutorials page which covers dozens of Kali Linux Tools.

How to Setup Environment – Kali Linux in windows

Enable the optional feature “Windows Subsystem for Linux” using the following PowerShell command and restart your computer.

Enable-WindowsOptionalFeature -Online -FeatureName Microsoft-Windows-Subsystem-Linux

In the next step, you can select your target distribution and click “Get”, once the download completed select “Launch” and it will open the console window.

Microsoft published the advisory to Install the Windows Subsystem for Linux.

Once the installation completed it is always recommended to Upgrade by using following Commands.

apt update
apt dist-upgrade
reboot

Like Kali Linux, there are some top Penetration Testing & Ethical Hacking Linux Distributions you can see them here.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Mozilla Warns Of Firefox Zero-Day Actively Exploited In Cyber Attacks

A critical use-after-free vulnerability affecting Firefox and Firefox Extended Support Release (ESR) is being...

SpyCloud Embeds Identity Analytics in Cybercrime Investigations Solution to Accelerate Insider and Supply Chain Risk Analysis & Threat Actor Attribution

IDLink, SpyCloud’s new automated digital identity correlation capability, is now core to its industry-leading...

Abusix and Red Sift Form New Partnership, Leveraging Automation to Mitigate Cyber Attacks

The agreement has marked over 600,000 fraudulent domains for takedown in just two months...

Hackers Exploiting Zero-day Flaw in Qualcomm Chips to Attack Android Users

Hackers exploit a zero-day vulnerability found in Qualcomm chipsets, potentially affecting millions worldwide.The flaw,...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Kali Linux 2024.2 Released With New Hacking Tools

The Kali Linux team has announced the release of Kali Linux 2024.2, the latest...

xz-utils Backdoor Affects Kali Linux Installations – How to Check for Infection

A critical vulnerability has been identified in the xz-utils package, versions 5.6.0 to 5.6.1,...

Kali Linux 2023.3 Released: What’s New!

Kali Linux 2023.3 is now available, and it includes a variety of new packages...