Adding a New Non-Root User in Kali Linux

Home > Blogs > Security > Adding a New Non-Root User in Kali Linux

Adding a New Non-Root User in Kali Linux

Like This Blog 2Mike Danseglio
Added by February 17, 2016

Kali Linux is a fantastic operating system for penetration testing and security evaluation. It comes with virtually all security tools built in, it’s lightweight by default, and it has a huge ecosystem that is constantly helping with the project.

For instructor-led Security training see our course schedule

I created a new installation of Kali Linux recently. One of the first post-installation tasks I did was to create a new user for daily use. Sadly, Kali only creates a default root user during setup. Running as root all the time is a horrible security practice, so I recommend that you create a new user as soon as possible after installation.

To create a new user in Kali Linux, first pop open a Terminal window.


Then use the adduser command. In this example I’m creating a user named mikedan with a home directory of /mikedan so the command is adduser –home /mikedan mikedan.


Adduser prompts for the rest of the information, which is optional.

The user account is created. Now I test it by logging out from root and logging in as mikedan. To be sure I open a new Terminal window and type whoami.

You may also like:  CompTIA Security+ What Motivates People to Take Your Intellectual Property?


Finished! The user account took only a few seconds to create and works as expected.


Mike Danseglio – CISSP, MCSE, and CEH

Mike Danseglio teaches IT Security Training, Windows, System Center and Windows Server 2012 classes at Interface Technical Training. His classes are available in Phoenix, AZ and online with RemoteLive™.

Videos You May Like

How to clone a Windows Server 2012 or 2012 R2 Domain Controller

1 676 2

One of the coolest new features in Window Server 2012 and Windows Server 2012 R2 is the ability to clone a Domain Controller. In the past, if we had virtualized Domain Controllers and we actually took a snapshot of it and then rolled back to that snapshot, it would break the logon service on that … Continue reading How to clone a Windows Server 2012 or 2012 R2 Domain Controller

Using WHOAMI.exe to troubleshoot NTFS Permissions in Windows

0 71 0

In this training video, learn how to use WHOAMI.exe to use to troubleshoot user NTFS permissions in Microsoft Windows and Windows Server.

Detailed Forensic Investigation of Malware Infections – April 21, 2015

2 300 3

In this IT Security training video, Security expert Mike Danseglio (CISSP / CEH) will perform several malware investigations including rootkits, botnets, viruses, and browser toolbars.

Write a Comment

See what people are saying...

  1. Abd-El Rahman Mamdouh

    is that recommended ? i am new on Kali Linux and i don’t wanna try it on root user
    so its good to create another user to use it
    but my inquiry is
    can i try the hack tools on non-root user ?

    a noob need advice here XD

  2. john black

    this will set up a user mikedan on /mikedan which is not what i wanted.
    the syntax that worked for me was:-
    adduser –home /home/mikedan mikedan
    this set up a user on /home/mikedan which is what i wanted.
    but thank you for the idea which puzzled me.

Share your thoughts...

Please fill out the comment form below to post a reply.