Listing Thumbnail

    Kali Linux with support by AskforCloud LLC

     Info
    Deployed on AWS
    AWS Free Tier
    This product has charges associated with it for support.Kali Linux is an open-source, Debian-based Linux distribution geared towards various information security tasks, such as Penetration Testing, Security Research, Computer Forensics and Reverse Engineering.

    Overview

    This is a repackaged open source software product wherein additional charges apply for support and maintenance by AskforCloud LLC.

    Kali Linux (formerly known as BackTrack Linux) is an open-source, Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. It does this by providing common tools, configurations, and automations which allows the user to focus on the task that needs to be completed, not the surrounding activity.

    Kali Linux contains industry specific modifications as well as several hundred tools targeted towards various Information Security tasks, such as Penetration Testing, Security Research, Computer Forensics, Reverse Engineering, Vulnerability Management and Red Team Testing.

    Kali Linux is a multi-platform solution, accessible and freely available to information security professionals and hobbyists.

    Kali Linux Features:

    • More than 600 penetration testing tools included.
    • Free and always will be: Kali Linux, like BackTrack, is completely free of charge and always will be. You will never, ever have to pay for Kali Linux.
    • Open source Git tree: We are committed to the open source development model and our development tree is available for all to see.
    • FHS compliant: Kali adheres to the Filesystem Hierarchy Standard, allowing Linux users to easily locate binaries, support files, libraries, etc.
    • Completely customizable
    • Wide-ranging wireless device support

    Disclaimer: This Virtual machine offer contains free and open source software. All the softwares, trademarks used in the Virtual machine offer are the exclusive property of their respective owners. Askforcloud LLC does not offer commercial license of the product mentioned above.

    Highlights

    • Kali Linux is an open-source, Debian-based Linux distribution geared towards various information security tasks, such as Penetration Testing, Security Research, Computer Forensics and Reverse Engineering.
    • Kali Linux is a multi-platform solution, accessible and freely available to information security professionals and hobbyists.

    Details

    Delivery method

    Delivery option
    64-bit (x86) Amazon Machine Image (AMI)

    Latest version

    Operating system
    OtherLinux Kali Linux

    Deployed on AWS

    Unlock automation with AI agent solutions

    Fast-track AI initiatives with agents, tools, and solutions from AWS Partners.
    AI Agents

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Kali Linux with support by AskforCloud LLC

     Info
    Pricing is based on actual usage, with charges varying according to how much you consume. Subscriptions have no end date and may be canceled any time.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    Usage costs (447)

     Info
    • ...
    Dimension
    Cost/hour
    t2.medium
    Recommended
    $0.10
    t3.micro
    AWS Free Tier
    $0.01
    t2.micro
    AWS Free Tier
    $0.01
    x1.16xlarge
    $1.00
    c3.large
    $0.10
    c6i.24xlarge
    $1.00
    m5a.16xlarge
    $1.00
    m6a.48xlarge
    $1.00
    g4ad.8xlarge
    $0.60
    u-18tb1.metal
    $1.00

    Vendor refund policy

    For this offer, Askforcloud LLC does not offer refund, you can cancel at anytime.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    64-bit (x86) Amazon Machine Image (AMI)

    Amazon Machine Image (AMI)

    An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.

    Version release notes

    Additional details

    Usage instructions

    Resources

    Vendor resources

    Support

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    10
    In Log Analysis, Monitoring
    Top
    100
    In Backup & Recovery

    Overview

     Info
    AI generated from product descriptions
    Penetration Testing Tools
    Comprehensive suite of over 600 specialized tools for security assessment and vulnerability identification
    Linux Distribution Architecture
    Debian-based open-source operating system with advanced security and forensics capabilities
    Platform Compatibility
    Multi-platform solution supporting various hardware and virtualization environments
    Security Research Framework
    Integrated configuration and automation for information security tasks including forensics and reverse engineering
    Device Support
    Extensive wireless device compatibility with flexible system configuration options
    Security Tool Collection
    Comprehensive suite of over 2500 pre-installed security and penetration testing tools including Nmap, Metasploit Framework, Wireshark, Aircrack-ng, John the Ripper, and Hydra
    Penetration Testing Capabilities
    Includes specialized tools for information gathering, vulnerability analysis, web application assessment, database assessment, password attacks, and wireless attacks
    Desktop Environment
    XFCE4 Desktop GUI with VNC access providing graphical interface for security testing and analysis
    Operating System Architecture
    Debian-based Linux distribution designed specifically for information security tasks with Filesystem Hierarchy Standard (FHS) compliance
    Security Research Toolset
    Comprehensive toolkit supporting multiple security domains including exploitation, sniffing, spoofing, post-exploitation, forensics, and reverse engineering
    Forensic Analysis Tools
    Comprehensive suite of forensic tools including Autopsy, DC3DD, and Guymager for digital forensics and data recovery
    Network Security Assessment
    Advanced network scanning and vulnerability assessment capabilities using tools like Nmap, Wireshark, and OpenVAS
    Exploitation Framework
    Robust exploitation toolkit with Metasploit Framework, sqlmap, and John the Ripper for identifying and testing system vulnerabilities
    Wireless Network Auditing
    Specialized wireless and Bluetooth assessment tools including Aircrack-ng, Kismet, and Ubertooth for comprehensive network security testing
    Web Application Security
    Integrated web application analysis tools such as Burp Suite, Nikto, and OWASP ZAP for comprehensive web security assessment

    Contract

     Info
    Standard contract

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 AWS reviews
    |
    13 external reviews
    Star ratings include only reviews from verified AWS customers. External reviews can also include a star rating, but star ratings from external reviews are not averaged in with the AWS customer star ratings.
    GurpreetSingh4

    Has small footprint and low maintenance cycles

    Reviewed on Jun 03, 2024
    Review provided by PeerSpot

    What is our primary use case?

    In general, Kali Linux is used for hosting applications, developing new applications, and operating systems. It's also used in containers and nodes. The tool offers a smaller footprint than Windows because it lacks the functionality of graphical user interfaces. One advantage of Kali Linux is its lower maintenance requirements than Windows, with slower update cycles and easier maintenance procedures.

    What is most valuable?

    The tool's most valuable features are low maintenance and stability. 

    What needs improvement?

    The tool is already stable and well-developed, so there's minimal feedback for enhancement or change. However, it should improve security, which is crucial, especially with the increasing use of Kali Linux in cloud environments.

    For how long have I used the solution?

    I have been using the product for a few months. 

    What do I think about the stability of the solution?

    I rate the tool's stability a ten out of ten.

    What do I think about the scalability of the solution?

    Kali Linux is scalable and has a smaller footprint. It can be run on multiple instances of your applications.

    How are customer service and support?

    We have community support. I haven't faced any problems with support. 

    How was the initial setup?

    The tool's deployment is quick and straightforward compared to Windows. It takes about five to ten minutes to complete. 

    What's my experience with pricing, setup cost, and licensing?

    Kali Linux offers a perpetual license, meaning you pay for it once and can use it. While free versions of Linux are available, Kali Linux, being an enterprise edition, usually comes with a perpetual license. I rate its pricing a five out of ten. 

    What other advice do I have?

    Pre-installed tools can provide basic training and security measures, which is helpful. However, these tools may not be sufficient to secure your workload fully. That's why it's important to complement them with other specialized security tools to enhance your overall security.

    Before using Kali Linux, make sure you know its pros and cons. It's a good system to learn because it's the best choice for some situations. It has default firewall settings that block everything by default. It's up to the user to decide how much they want to open up.       

    Learning Kali Linux takes time because it relies on command-line tasks instead of graphical interfaces. Practice is key to becoming comfortable with it.

    VishalSingh

    A stable and reliable solution for penetration and session testing

    Reviewed on May 28, 2024
    Review provided by PeerSpot

    What is our primary use case?

    Kali Linux's use cases are quite diverse. It can be used as an operating system for learning Linux, penetration testing, ethical hacking, and much more.

    What is most valuable?

    The most effective features of Kali Linux include its stability as a Linux operating system, its flexibility in configuring resources such as partitions, its powerful and stable file system, and its multi-user capability, which allows for setting user privileges and rights. Additionally, Kali Linux provides access to a wide range of free and open-source applications for testing and development purposes.

    The tool's most valuable features for security tasks include its resistance to viruses, ability to configure and filter incoming connections, and security measures that make it difficult for hackers to break into the system. Linux systems are known for their strong security measures, including numerous checkpoints and gates that make hacking attempts difficult. As a result, many financial and scientific institutions prefer to use Linux for its enhanced security compared to Windows.

    With access to a vast repository of tools, users can install third-party tools and perform various tasks related to network testing, penetration testing, and session testing.

    What needs improvement?

    The tool is slightly difficult to learn. 

    What do I think about the stability of the solution?

    I rate the tool's stability a nine out of ten. 

    What do I think about the scalability of the solution?

    Kali Linux's scalability depends on the available resources. Depending on the resources available, users can install multiple instances of Kali Linux, which can be scaled up to meet the needs of various user sizes.

    How are customer service and support?

    I've never contacted Kali Linux for technical support. Most issues and their resolutions are readily available on the internet.

    How was the initial setup?

    The solution's deployment is easy and takes about ten minutes to deploy. 

    What other advice do I have?

    I rate the overall product a nine out of ten. For aspiring ethical hackers, I highly recommend using Kali Linux. It's stable and reliable. However, remember that while Kali Linux is very reliable, new bugs and issues may arise occasionally, and driver support for new hardware can sometimes be lacking. 

    Additionally, it's worth noting that Linux operating systems like Kali Linux are not designed for general entertainment purposes like gaming. They are preferred by developers, engineers, and technical users who want to customize and utilize the full potential of their operating system. If you're looking for a system for general purposes like internet browsing and gaming, Windows or macOS may be more suitable options.

    reviewer1232808

    Very user-friendly and offers good performance

    Reviewed on May 09, 2024
    Review provided by PeerSpot

    What is our primary use case?

    I use the solution in my company for penetration testing. The product is used to check if there is any vulnerability within a system.

    What is most valuable?

    The solution's most valuable feature is that it is very easy to use. The tool is very user-friendly, and its performance is very good.

    What needs improvement?

    From an improvement perspective, it should be made possible for users to learn about the product easily.

    For how long have I used the solution?

    I have been using Kali Linux for three months.

    What do I think about the stability of the solution?

    Stability-wise, I rate the solution a nine out of ten.

    What do I think about the scalability of the solution?

    Scalability-wise, I rate the solution a nine out of ten.

    How was the initial setup?

    The product's initial setup phase was straightforward.

    One just needs to create a bootable drive to install the product.

    The solution is deployed on an on-premises model.

    What about the implementation team?

    I can take care of the product's installation myself.

    What's my experience with pricing, setup cost, and licensing?

    I have used the free version.

    What other advice do I have?

    I strongly recommend the product to others who plan to use it since it is a reliable tool.

    When it comes to the learning curve for new users who plan to use the product, I would say that if someone is not familiar with cybersecurity, then they would need at least six months to a year to learn about the product.

    In terms of the value derived from the use of the product, I could see that with the solution, I was able to see the vulnerabilities.

    I rate the solution an eight out of ten.

    Which deployment model are you using for this solution?

    On-premises
    Rohit Srivastava

    SQLmap for web application testing and good for web application penetration testing, network testing, vulnerability assessment of any devices or domains

    Reviewed on Apr 22, 2024
    Review provided by PeerSpot

    What is our primary use case?

    In my cybersecurity work, I use Kali Linux for web application penetration testing, network testing, vulnerability assessment of any devices or domains, multiple testing types, and code testing. Those are certain basic use cases.

    I used Kali Linux in multiple companies like banks, IT companies, and even smaller companies like music departments or other departments. But mostly, I use it for IT companies and banks.

    How has it helped my organization?

    The systems that are not completely updated create vulnerabilities on the system or on the domain. So first, we have to upgrade all the systems and apply complete security patches. In Windows, there are security patches; in Linux, there are also security patches. We'll upgrade the system. 

    Additionally, Kali Linux is wonderful. If there is a specific requirement for a lower version, then we have to put a specific script over the database or over the code so nobody can directly access that code.

    What is most valuable?

    I frequently use SQLmap for web application testing, along with other tools like Burp Suite and Vega.

    When we execute commands on tools and the few scripts that I have prepared, we will use SQLmap to execute those scripts on the target system. This helps us find loopholes. Like, a report may show TXG is open or that the configuration password is in cleartext. 

    Based on this, we suggest vendors make the required changes, or if they are using an older version, they might need a newer upgrade. So there's a lot of capability in it. We suggest upgrading that version, and after completing the vulnerability assessment, we prepare a diagnostic report with suggestions. 

    Once we provide complete details, then they take some time to fix those vulnerabilities. After that, we'll again execute the vulnerability assessment as a second phase. If everything goes fine, then we will give them certification that their system and application are now secure.

    What needs improvement?

    Sometimes, I do face challenges. There's an issue where sometimes during the initial installation, it doesn't install properly. It gives multiple errors like packages not installing, so we have to install those tools separately. For instance, if we want to install a network or other tools, we have to install those complete toolkits manually.

    So, the challenge is with the initial setup, where I sometimes get errors. 

    Regarding wireless attacks, OS attacks, and social engineering... the tools should be easier to learn because I know everything very well, but some people in my team struggle to understand. If there were GUI interfaces for the tools, it would help me guide my team in using them step-by-step. Command lines are very difficult for other team members who know the tool's purpose but not the Linux commands. GUI interfaces need more improvement.

    So, the UI interface needs improvement to make it more visible and easier for users. Expert users can do everything without any issues, but new users will struggle.

    For how long have I used the solution?

    I've been working with Kali Linux for the last 10 to 12 years. I use the latest version. 

    What do I think about the stability of the solution?

    The stability is good because I've been using it for the last ten years. I've completed many successful projects, providing good vulnerability assessments to my clients and vendors.

    What do I think about the scalability of the solution?

    It is a scalable solution. I would rate the scalability an eight out of ten.  

    We have about four to five users using Kali Linux. Two or three are basic users; they need to learn first before they can execute the scripts.

    We do not plan to increase the further usage because we do not have the need. I and some other partners have good experience with it, and we are managing those parts.

    How are customer service and support?

    I tried to connect to customer support through email, but I received responses very slowly. In those situations, I do my own research and development to fix those particular errors.

    For their understanding of the errors and providing solutions, I'd give them a ten out of ten. But about response time, I'll give it a five because it's very slow.

    How would you rate customer service and support?

    Neutral

    How was the initial setup?

    From my perspective, I can set up Kali Linux with information gathering, vulnerability analysis tools, and application analysis tools. I'm able to configure those. 

    However, now many people are interested in cybersecurity. So, I suggest that Kali Linux should improve things like the GUI interface, make it easier to use, and include a training portal that's easier for basic users to understand.

    I use it sometimes on-premises and sometimes on the cloud.

    Sometimes the setup takes only one hour, no more than that. But if we start getting errors, then it can take four to five hours to complete the setup of Kali Linux.

    What's my experience with pricing, setup cost, and licensing?

    The price is good because Kali Linux already provides a good bundle of tools. The price is sufficient if you want a good operating system with the necessary tools. So, the cost is not an issue.

    What other advice do I have?

    Kali Linux is much better than others because it gives you a good set of tools. It is preferred for vulnerability assessments and cybersecurity. You don't have to spend a lot of money on different tools like Tenable. We don't need those because everything is already there in Kali. You just need to explore, configure it properly, and it will provide you with good results.

    Overall, I would rate it an eight out of ten because any new user or someone without deep expertise won't be able to understand how to scale or manage it, but an experienced person can. 

    AntoSebastin

    Helps to perform penetration testing for networks, web applications, and Android mobile apps

    Reviewed on Apr 17, 2024
    Review provided by PeerSpot

    What is our primary use case?

    I use the tool with Nmap to perform network audits. We use it to find vulnerabilities in our network through attacks. It's for those who want to launch or create viruses or perform attacks on systems. With Kali Linux, you can conduct penetration testing for networks, web applications, and Android mobile apps.

    What needs improvement?

    The product should improve its security features.

    For how long have I used the solution?

    I have been using the product for five years. 

    What do I think about the stability of the solution?

    I rate Kali Linux's stability a nine out of ten. 

    What do I think about the scalability of the solution?

    I rate the tool's scalability a seven to eight out of ten. I use it for my personal purposes. 

    How are customer service and support?

    Kali Linux is open-source and doesn't have support. 

    How was the initial setup?

    Setting up Kali Linux is straightforward. Deploying and installing it on our machines typically takes 25 minutes. The basic steps involve providing your name and selecting the location and time settings during installation. Once completed, you can use the default credentials to log into the Kali Linux operating system and gain permissions.

    What's my experience with pricing, setup cost, and licensing?

    The tool is open-source. 

    What other advice do I have?

    Kali Linux is a beginner tool. You can use it for testing and practicing. However, using it for real-time attacks can pose legal issues. Users can perform penetration testing but should refrain from attacking real company websites.

    The tool is useful for personal use, such as for hackers or for conducting penetration testing and gathering information for review purposes. However, using it for unauthorized or suspicious activities could lead to legal repercussions.

    I rate the overall product an eight out of ten. Hackers could potentially use it as a weapon to attack any company or website. 

    View all reviews