Installing Every Possible Penetration Testing Tool in Kali Linux

Home > Blogs > Security > Installing Every Possible Penetration Testing Tool in Kali Linux

Installing Every Possible Penetration Testing Tool in Kali Linux

4 3 Mike Danseglio
Added by May 17, 2016

Kali Linux is a fantastic operating system for penetration testing and security evaluation. It comes with virtually all security tools built in, it’s lightweight by default, and it has a huge ecosystem that is constantly helping with the project.

Kali recently began moving towards a rolling distribution. This allows both the core Debian operating system components and the applications to update much more frequently with fewer dependency breaks. This is big deal, both because all future development will be on the rolling distribution and because the current distribution will not be supported after April 15th 2016.

This nearly-constant update rhythm is great for penetration testers. Kali will now have the very latest builds of essential tools like Metasploit, Kismet, and aircrack-ng. It will also get Debian Linux updates more frequently to support newer hardware and integrate bugfixes.

A frequently overlooked detail when installing Kali is that the installation ISO comes with only some of the available penetration testing tools. Kali’s developers and distribution owners make an effort to strike a balance between including all tools by default and the ever-increasing size of the ISO. There are also some tools that won’t work on some systems, like the GPU brute-force cracking tools that only work with specific video cards. In that light, it makes sense to leave some tools out.

What’s great is that installing the full set of tools is very simple. First, open a Terminal window.

If you’re not logged in as root type su to become root. You can also preface the next statement with sudo for the same effect.

Next run apt-get update to update the package list.

001-Possible-Penetration-Testing-Tool-in-Kali-Linux

Now run apt-get install kali-linux-all.

002-Possible-Penetration-Testing-Tool-in-Kali-Linux

This command installs all possible penetration testing tools from the Kali repository. You can see that on my fully updated installation, Kali has 435 extra tools that it can install.

There’s always a downside though. Here, the downside is that much more space will be used. As a reference, my Kali Linux installation now takes up 15.1 GB of space, compared to about 10 GB from a fresh installation. In my opinion this is a worthwhile trade-off, and I always install all tools on my Kali systems.

Enjoy!

Mike Danseglio – CISSP, MCSE, and CEH

Mike Danseglio teaches IT Security Training, Windows, System Center and Windows Server 2012 classes at Interface Technical Training. His classes are available in Phoenix, AZ and online with RemoteLive™.

Videos You May Like

Agile Methodology in Project Management

0 154 0

In this video, you will gain an understanding of Agile and Scrum Master Certification terminologies and concepts to help you make better decisions in your Project Management capabilities. Whether you’re a developer looking to obtain an Agile or Scrum Master Certification, or you’re a Project Manager/Product Owner who is attempting to get your product or … Continue reading Agile Methodology in Project Management

Windows 10 Features and Navigation – December 1, 2015

0 114 1

In this recorded Windows 10 webinar from December 1,2015, Windows Instructor Steve Fullmer presents the navigation and some of the new features associated with Windows 10 including Sysinternals Tools for Windows Client, Windows core concepts, exploring Process Explorer as well as some of the features that are not yet ready for prime time but will … Continue reading Windows 10 Features and Navigation – December 1, 2015

Detailed Forensic Investigation of Malware Infections – April 21, 2015

4 608 5

How does an investigator hunt down and identify unknown malware? In this recording of our IT Security training webinar on April 21, 2015, Security expert Mike Danseglio (CISSP / CEH) performed several malware investigations on infected computers and identify symptoms, find root cause, and follow the leads to determine what’s happening. He demonstrated his preferred … Continue reading Detailed Forensic Investigation of Malware Infections – April 21, 2015

Write a Comment

See what people are saying...

  1. Avatar Grant

    Wow, this takes a while!!

  2. Avatar George

    It sounds like you formatted the drive to accommodate the OS, but the remaining space on the drive was not formatted as usable “free” space. I would verify this theory by checking to see your total used space vs free space. If you don’t see the amount of free space you should be seeing given the actual size of your drive, I would look into finding a way to reclaim that unused/unformatted space. Good luck!

  3. Avatar RobPSi

    dear Mike,
    much thanks for that.
    Problem is that, despite having a 64gb usb with persistence, I get a no free space error. Any idea on how to get around that? Cheers

Share your thoughts...

Please fill out the comment form below to post a reply.