I use the tool with Nmap to perform network audits. We use it to find vulnerabilities in our network through attacks. It's for those who want to launch or create viruses or perform attacks on systems. With Kali Linux, you can conduct penetration testing for networks, web applications, and Android mobile apps.
Kali Linux with support by AskforCloud LLC
Askforcloud LLCExternal reviews
External reviews are not included in the AWS star rating for the product.
Helps to perform penetration testing for networks, web applications, and Android mobile apps
What is our primary use case?
What needs improvement?
The product should improve its security features.
For how long have I used the solution?
I have been using the product for five years.
What do I think about the stability of the solution?
I rate Kali Linux's stability a nine out of ten.
What do I think about the scalability of the solution?
I rate the tool's scalability a seven to eight out of ten. I use it for my personal purposes.
How are customer service and support?
Kali Linux is open-source and doesn't have support.
How was the initial setup?
Setting up Kali Linux is straightforward. Deploying and installing it on our machines typically takes 25 minutes. The basic steps involve providing your name and selecting the location and time settings during installation. Once completed, you can use the default credentials to log into the Kali Linux operating system and gain permissions.
What's my experience with pricing, setup cost, and licensing?
The tool is open-source.
What other advice do I have?
Kali Linux is a beginner tool. You can use it for testing and practicing. However, using it for real-time attacks can pose legal issues. Users can perform penetration testing but should refrain from attacking real company websites.
The tool is useful for personal use, such as for hackers or for conducting penetration testing and gathering information for review purposes. However, using it for unauthorized or suspicious activities could lead to legal repercussions.
I rate the overall product an eight out of ten. Hackers could potentially use it as a weapon to attack any company or website.
Offers good UI and is useful for vulnerability assessment
What is our primary use case?
I use the solution in my company for vulnerability assessment, to run penetration testing, and to do automated scans of the websites for malware. In general, the tool is useful to check for vulnerabilities in websites and applications.
What is most valuable?
The interface is good and straightforward to use.
What needs improvement?
In the older versions of the solution, there were problems with the UI. Improvements are only required in the UI of the product's older version. In the latest version of the product, the UI is good. If you know how to use the product, the UI part is okay.
There can be some lagging issues because the product gets stuck at times, making it an area of concern where improvements are required.
For how long have I used the solution?
I have experience with Kali Linux since 2017.
What do I think about the stability of the solution?
It is a stable solution. Stability-wise, I rate the solution an eight out of ten.
At times, the product gets stuck, and there are some lagging-related issues, but it is something that depends on the system you are running the product on, so you can change the system if required.
What do I think about the scalability of the solution?
It is a scalable solution.
Only I use the product in my company.
How was the initial setup?
The tool is not hard to deploy. You just need to download Kali Linux Images and decide on how you want to deploy it. You can deploy the tool directly on a laptop, or you can deploy it through VirtualBox from VMware. For deployment, I just need to open Kali Linux Image on VirtualBox.
What's my experience with pricing, setup cost, and licensing?
It is an open-source tool.
What other advice do I have?
I have found the tool to be the most effective when we want to run the vulnerability assessment provided by the solution in our company for certain websites and applications so that we can find or detect issues. In our company, Kali Linux is used for most of the use case scenarios where vulnerability assessment is required.
The areas I found to be the most effective from the perspective of security tasks are Zed Attack Proxy (ZAP), Metasploit, Wireshark, Nikto, and SQLMAP.
There have been a lot of benefits from the pre-installed tools in the product, in terms of security auditing part in our company. There are also other operating systems on which you can run Kali Linux, where users are provided with a massive range of tools like BlackArch Linux and ParrotOS, which are useful for certain use cases.
The product is good to start with, and it is good for penetration testing and vulnerability assessment. It is good for those who want to go into the line of website security. New users of the product should know the basics of Linux to be able to use the solution because it is an area that could be hard for many.
The value derived from the use of the product in our company stems from the results it provides us. The reason to use the product is to get answers when you run a vulnerability assessment from a security perspective. The product provides an outcome that can be used to access the security posture of an application, and it can also help you find loopholes. In general, it can be used to test applications.
I rate the tool a ten out of ten.
Ensures a robust suite of penetration testing tools, extensive community support and customizable features for cybersecurity professionals
What is our primary use case?
I utilize Kali Linux for my penetration testing projects, where I leverage various tools like Austin Tools to gather additional information and for ethical hacking purposes. Since my primary operating system is Windows 11, I run Kali Linux in a virtualized environment using tools like VirtualBox.
How has it helped my organization?
The pre-installed tools on Kali Linux are incredibly useful, particularly for gathering information. When we first open the manual or explore the resources, we find a plethora of tools available for information gathering. These tools are indispensable for anyone using Kali Linux, as they provide essential functionality right from the beginning, especially in the realm of information gathering.
Linux offers customizable features that significantly enhance our workflow and testing processes. Its extensive customizability makes it easy to tailor to our specific needs.
What is most valuable?
Kali Linux provides me with a wide array of tools such as SQLMap, Nmap, and Hydra, which I explore to enhance my understanding of security concepts. Overall, Kali Linux offers a diverse toolkit for various security tasks.
The tools available in Kali Linux are incredibly effective for conducting security assessments. One tool I particularly favor is the Managed Tool, which I've been using for information gathering for about two years, especially for extracting hidden information from WhatsApp. Additionally, for SQL injection, I rely on SQLMap, and for conducting scans and reviews, I rely on VWNX.
What needs improvement?
The installation process of Kali Linux can be slow, particularly when installing and upgrading packages within virtualized environments. This sluggishness may be due to various factors, including the source of the download and any potential issues with the operating system.
For how long have I used the solution?
I have been using it for two years.
What do I think about the stability of the solution?
It's generally stable, especially when used for virtualization, which is how I primarily utilize it. I would rate it eight out of ten.
What do I think about the scalability of the solution?
It provides good scalability capabilities. I would rate it nine out of ten.
How are customer service and support?
The technical support for Kali Linux is quite reliable, primarily due to the active community engagement on forums. Additionally, the documentation available on the website is accurate and well-structured, providing clear guidance and support.
How was the initial setup?
The initial setup can be challenging sometimes. I would rate it eight out of ten.
What about the implementation team?
Deployment typically takes around ten minutes.
What's my experience with pricing, setup cost, and licensing?
I use it free of charge.
What other advice do I have?
I would recommend delving deeper into the functionality of the installation tools, particularly focusing on the favorite tools available on Linux. This includes tools beneficial for networking testing and other functionalities I've observed to be valuable. It seems worthwhile to invest time in studying the various tools offered by Kali Linux. Overall, I would rate it nine out of ten.
Has good web security and troubleshooting features
What is our primary use case?
We use different features in Kali Linux that are offered unlimited in the free version.
What is most valuable?
The most valuable features are the web security and troubleshooting features. It also has a good price.
What needs improvement?
I would like for them to offer more features for the free version in order for users to test them in their internal environment before purchasing.
For how long have I used the solution?
I have been using Kali Linux for the last three years.
What do I think about the stability of the solution?
It is a stable solution.
What do I think about the scalability of the solution?
It is a scalable solution. Nine users are using it in our company.
How was the initial setup?
The initial setup is easy. Understanding Linux is essential before beginning the setup process. You should have a basic understanding because it's very different than the Windows deployment installation.
What's my experience with pricing, setup cost, and licensing?
The licensing fee is expensive compared to other products.
What other advice do I have?
Overall, I would rate the solution an eight out of ten.
Scans and analyzes existing security tools
What is most valuable?
Kali Linux has recently implemented a new tool that scans and analyzes existing security tools. This handles loop detection, support tools, and other functionalities, effectively streamlining system optimization.
Additionally, it now includes comprehensive migration analytics and reporting capabilities.
What needs improvement?
Unfortunately, my current tool runs on Windows 10, and its use is restricted to enterprise versions. Integrating this tool or similar functionalities into Kali Linux for non-enterprise users would be incredibly valuable.
For how long have I used the solution?
I have been using Kali Linux for eight months. We are using the V3.4 of the solution.
What do I think about the stability of the solution?
The product is stable.
I rate the solution’s stability a nine out of ten.
What do I think about the scalability of the solution?
I am using the solution.
How was the initial setup?
The initial setup is easy. You will use any solution if you learn how to load in general. It takes five to ten minutes to deploy the solution.
What's my experience with pricing, setup cost, and licensing?
The product is free of cost.
What other advice do I have?
Overall, I rate the solution a nine out of ten.
Brings business to our organization because the reports are shown to the client once we do the testing
What is our primary use case?
We use it for security testing and penetration testing for vulnerability assessment.
How has it helped my organization?
Kali Linux brings business to our organization because the reports are shown to the client once we do the testing. We start putting recommendations, consultation fees, and so on.
What is most valuable?
The solution has documentation availability, resources, and expertise. It is public everywhere. It also has high scalability and high performance.
What needs improvement?
The solution’s interface could be more user-friendly. Also, it has a limited number of applications.
For how long have I used the solution?
I have been using Kali Linux for more than ten years. We are using the latest version of the solution.
What do I think about the stability of the solution?
The product is stable.
I rate the solution’s stability a ten out of ten.
What do I think about the scalability of the solution?
Forty users use this solution. We can increase the number of users easily because of professional licenses. It's designed for complex companies. We can increase the number of users as much as we need.
Which solution did I use previously and why did I switch?
We tried Ubuntu, but it is not as good as Kali Linux for security testing.
How was the initial setup?
The initial setup is very straightforward and takes two hours to complete. For deployment, we need hardware with suitable specs.
What about the implementation team?
Deployment was done in-house.
What's my experience with pricing, setup cost, and licensing?
The product is free.
What other advice do I have?
We need two people for the solution’s maintenance, one for the environment and another for installation.
Overall, I rate the solution a nine out of ten.
Useful for open-source intelligence and identifying vulnerabilities
What is our primary use case?
We use the product for open-source intelligence and identifying vulnerabilities.
How has it helped my organization?
Kali Linux helps me with security assessments.
What needs improvement?
The product should integrate AI and GPT capabilities.
What do I think about the stability of the solution?
I rate the product's stability an eight out of ten.
What do I think about the scalability of the solution?
I rate Kali Linux's scalability a seven out of ten. I alone use the solution in my company.
How are customer service and support?
The product has many communities which makes support easy.
How was the initial setup?
I rate the product's deployment a nine out of ten. You need to have programming skills to do customization. Deployment can be completed in half an hour. I google for answers whenever I am stuck.
What's my experience with pricing, setup cost, and licensing?
Kali Linux is open source.
What other advice do I have?
I rate Kali Linux a nine out of ten.
A highly stable tool useful for penetration testing
What is our primary use case?
I use Kali Linux for penetration testing, web applications, infrastructure, and cloud. The tool is useful to test the main applications in our company.
What is most valuable?
The most valuable feature of the solution is that the product comes with a lot of useful tools for me, like Nmap, subfinder, and the Metasploit Framework, which is very helpful. The tool also helps with web applications.
What needs improvement?
From an improvement perspective, Kali Linux could include more ML to help with academic literature, as it is one of the areas where there are shortcomings in the solution.
Blockchain and artificial intelligence are areas I would like to see in the future releases of the solution.
For how long have I used the solution?
I have been using Kali Linux for five years. I use the solution's latest version.
What do I think about the stability of the solution?
The solution's stability is very good. Stability-wise, I rate the solution a nine out of ten.
What do I think about the scalability of the solution?
I use the product for penetration testing, and I operate as a freelancer.
Which solution did I use previously and why did I switch?
I use Arch Linux and BlackArch at times.
How was the initial setup?
The product's initial setup phase was very easy with Oracle VM VirtualBox.
The solution is deployed on the cloud, but it is mostly deployed on the Oracle VM VirtualBox.
The solution can be deployed in a few minutes.
What was our ROI?
I have seen some benefits from the use of the solution.
What's my experience with pricing, setup cost, and licensing?
There is no need to make any payments towards the licensing costs since it is a solution that is available for free.
What other advice do I have?
I recommend the solution to those who plan to use it.
I rate the overall tool a nine out of ten.
A highly stable solution that can be used to detect, monitor, and maintain security in an environment
What is our primary use case?
I use Kali Linux to do a simulation attack on another system and show them that the antivirus can protect this system.
What is most valuable?
The most valuable feature of Kali Linux is the attack it performs using a CVE script that's already on the internet. The solution saves a lot of my time because instead of creating a script, I can take the available script and execute it for that machine.
What needs improvement?
I would like to have automation in Kali Linux instead of manually configuring or setting up something in case of an upgrade.
For how long have I used the solution?
I have been using Kali Linux for a couple of months.
What do I think about the stability of the solution?
I rate Kali Linux ten out of ten for stability.
How was the initial setup?
The solution’s initial setup is straightforward.
What about the implementation team?
We implemented the solution through an in-house team. The solution was deployed in 30 minutes. The solution's deployment process is the same as Ubuntu Linux. It depends on the type of Kali Linux you want to install, and then you have to execute it.
What was our ROI?
Each company has an audit, and Kali Linux can be used for vulnerability testing and detecting other system weaknesses in the environment.
What's my experience with pricing, setup cost, and licensing?
Kali Linux is a free product, and you don't have to pay for a license.
What other advice do I have?
Choosing Kali Linux depends on the user's use case. Users who want to have an audit for the network or the endpoint can definitely use Kali Linux. It is a free product, and it has greater capability to detect, monitor, and maintain security in one environment.
Overall, I rate Kali Linux ten out of ten.