My main use case for Kali Linux is to develop a product, secure our network, and conduct penetration testing, as well as model designing. I work on a red team, and we frequently use Kali Linux for penetration testing because it has many open-source tools.
Recently, I used Kali Linux for an OWASP model to conduct a vulnerability scan and penetration testing of one of our retail websites. We attempted to penetrate the system to identify any vulnerabilities using a few tools in Kali Linux such as Nmap and John Miller, which are tools for password cracking, penetration testing, and vulnerability scanning.
Kali Linux is a good integrated tool for OSINT, open-source intelligence. As a certified ethical hacker on a red team, I can say that to protect our infrastructure, we usually use Kali Linux for sandboxing and penetration testing.
In my day-to-day activities, I rely most on the variety of GitHub models available in the public domain. We can import those repositories into Kali Linux to develop our machine learning model, which helps identify network threats by integrating with our SIEM tool, such as a GenAI SIEM tool.
In my day-to-day activities, Kali Linux significantly helps in reducing vulnerabilities because it has open-source tools. I do not need to rely on costly licensing, and I can easily integrate those tools into our infrastructure. For the vulnerability tools, we were using Nmap and WPScan, which performed well without needing to purchase expensive solutions.
Kali Linux functions as a platform, not just a tool. It can run other security tools quite easily, but some cloud-related products, such as Sentinel, cannot run directly on it; instead, we can deploy models created with it.
We always choose Kali Linux for penetration testing, as it is undoubtedly a market leader.
Kali Linux runs efficiently with minimum resources. We use it on-premises and can add resources as needed without any bloat or unwanted software; it is lightweight compared to Windows and scales well, especially in a VM environment.