Let's set up our first virtual machine, our attacker machine, Kali Linux. The Kali Linux operating system is a Debian-based Linux platform consisting of over 300 tools for both penetration testing and forensics. It's one of the most popular platforms used by penetration testers as it contains many features and considerable functionality, such as the following:
- Full-disk encryption
- Support for Linux Unified Key Setup (LUKS) encryption with emergency self-destruction (Nuke)
- Accessibility features
- Forensics mode
- Live USB with multiple persistence
To get started, Kali Linux can be found at the official website (www.kali.org) and at the Offensive Security domain (https://www.offensive-security.com/kali-linux-vm-vmware-virtualbox-image-download/ ...