Installing Every Possible Penetration Testing Tool in Kali Linux

Home > Blogs > Security > Installing Every Possible Penetration Testing Tool in Kali Linux

Installing Every Possible Penetration Testing Tool in Kali Linux

3 2Mike Danseglio
Added by May 17, 2016

Kali Linux is a fantastic operating system for penetration testing and security evaluation. It comes with virtually all security tools built in, it’s lightweight by default, and it has a huge ecosystem that is constantly helping with the project.

Kali recently began moving towards a rolling distribution. This allows both the core Debian operating system components and the applications to update much more frequently with fewer dependency breaks. This is big deal, both because all future development will be on the rolling distribution and because the current distribution will not be supported after April 15th 2016.

This nearly-constant update rhythm is great for penetration testers. Kali will now have the very latest builds of essential tools like Metasploit, Kismet, and aircrack-ng. It will also get Debian Linux updates more frequently to support newer hardware and integrate bugfixes.

A frequently overlooked detail when installing Kali is that the installation ISO comes with only some of the available penetration testing tools. Kali’s developers and distribution owners make an effort to strike a balance between including all tools by default and the ever-increasing size of the ISO. There are also some tools that won’t work on some systems, like the GPU brute-force cracking tools that only work with specific video cards. In that light, it makes sense to leave some tools out.

You may also like:  The Importance of Updating Kali Linux Rolling Distribution

What’s great is that installing the full set of tools is very simple. First, open a Terminal window.

If you’re not logged in as root type su to become root. You can also preface the next statement with sudo for the same effect.

Next run apt-get update to update the package list.

001-Possible-Penetration-Testing-Tool-in-Kali-Linux

Now run apt-get install kali-linux-all.

002-Possible-Penetration-Testing-Tool-in-Kali-Linux

This command installs all possible penetration testing tools from the Kali repository. You can see that on my fully updated installation, Kali has 435 extra tools that it can install.

There’s always a downside though. Here, the downside is that much more space will be used. As a reference, my Kali Linux installation now takes up 15.1 GB of space, compared to about 10 GB from a fresh installation. In my opinion this is a worthwhile trade-off, and I always install all tools on my Kali systems.

Enjoy!

Mike Danseglio – CISSP, MCSE, and CEH

Mike Danseglio teaches IT Security Training, Windows, System Center and Windows Server 2012 classes at Interface Technical Training. His classes are available in Phoenix, AZ and online with RemoteLive™.

Videos You May Like

Agile Methodology in Project Management

0 74 0

In this video, you will gain an understanding of Agile and Scrum Master Certification terminologies and concepts to help you make better decisions in your Project Management capabilities. Whether you’re a developer looking to obtain an Agile or Scrum Master Certification, or you’re a Project Manager/Product Owner who is attempting to get your product or … Continue reading Agile Methodology in Project Management

How to clone a Windows Server 2012 or 2012 R2 Domain Controller

1 618 2

One of the coolest new features in Window Server 2012 and Windows Server 2012 R2 is the ability to clone a Domain Controller. In the past, if we had virtualized Domain Controllers and we actually took a snapshot of it and then rolled back to that snapshot, it would break the logon service on that … Continue reading How to clone a Windows Server 2012 or 2012 R2 Domain Controller

Detailed Forensic Investigation of Malware Infections – April 21, 2015

2 271 3

In this IT Security training video, Security expert Mike Danseglio (CISSP / CEH) will perform several malware investigations including rootkits, botnets, viruses, and browser toolbars.

Write a Comment

See what people are saying...

  1. George

    It sounds like you formatted the drive to accommodate the OS, but the remaining space on the drive was not formatted as usable “free” space. I would verify this theory by checking to see your total used space vs free space. If you don’t see the amount of free space you should be seeing given the actual size of your drive, I would look into finding a way to reclaim that unused/unformatted space. Good luck!

  2. RobPSi

    dear Mike,
    much thanks for that.
    Problem is that, despite having a 64gb usb with persistence, I get a no free space error. Any idea on how to get around that? Cheers

Share your thoughts...

Please fill out the comment form below to post a reply.