In general, Kali Linux is used for hosting applications, developing new applications, and operating systems. It's also used in containers and nodes. The tool offers a smaller footprint than Windows because it lacks the functionality of graphical user interfaces. One advantage of Kali Linux is its lower maintenance requirements than Windows, with slower update cycles and easier maintenance procedures.
Kali Linux
KaliExternal reviews
External reviews are not included in the AWS star rating for the product.
does what its supposed to
people complaining about ssh are just silly. I am able to ssh no problem to this and i have rolled out many
Works well
I suspect the people marking this 1 star did not read the instructions and see the user required is `kali` not root or ec2-user.
Has small footprint and low maintenance cycles
What is our primary use case?
What is most valuable?
The tool's most valuable features are low maintenance and stability.
What needs improvement?
The tool is already stable and well-developed, so there's minimal feedback for enhancement or change. However, it should improve security, which is crucial, especially with the increasing use of Kali Linux in cloud environments.
For how long have I used the solution?
I have been using the product for a few months.
What do I think about the stability of the solution?
I rate the tool's stability a ten out of ten.
What do I think about the scalability of the solution?
Kali Linux is scalable and has a smaller footprint. It can be run on multiple instances of your applications.
How are customer service and support?
We have community support. I haven't faced any problems with support.
How was the initial setup?
The tool's deployment is quick and straightforward compared to Windows. It takes about five to ten minutes to complete.
What's my experience with pricing, setup cost, and licensing?
Kali Linux offers a perpetual license, meaning you pay for it once and can use it. While free versions of Linux are available, Kali Linux, being an enterprise edition, usually comes with a perpetual license. I rate its pricing a five out of ten.
What other advice do I have?
Pre-installed tools can provide basic training and security measures, which is helpful. However, these tools may not be sufficient to secure your workload fully. That's why it's important to complement them with other specialized security tools to enhance your overall security.
Before using Kali Linux, make sure you know its pros and cons. It's a good system to learn because it's the best choice for some situations. It has default firewall settings that block everything by default. It's up to the user to decide how much they want to open up.
Learning Kali Linux takes time because it relies on command-line tasks instead of graphical interfaces. Practice is key to becoming comfortable with it.
Offers good UI and is useful for vulnerability assessment
What is our primary use case?
I use the solution in my company for vulnerability assessment, to run penetration testing, and to do automated scans of the websites for malware. In general, the tool is useful to check for vulnerabilities in websites and applications.
What is most valuable?
The interface is good and straightforward to use.
What needs improvement?
In the older versions of the solution, there were problems with the UI. Improvements are only required in the UI of the product's older version. In the latest version of the product, the UI is good. If you know how to use the product, the UI part is okay.
There can be some lagging issues because the product gets stuck at times, making it an area of concern where improvements are required.
For how long have I used the solution?
I have experience with Kali Linux since 2017.
What do I think about the stability of the solution?
It is a stable solution. Stability-wise, I rate the solution an eight out of ten.
At times, the product gets stuck, and there are some lagging-related issues, but it is something that depends on the system you are running the product on, so you can change the system if required.
What do I think about the scalability of the solution?
It is a scalable solution.
Only I use the product in my company.
How was the initial setup?
The tool is not hard to deploy. You just need to download Kali Linux Images and decide on how you want to deploy it. You can deploy the tool directly on a laptop, or you can deploy it through VirtualBox from VMware. For deployment, I just need to open Kali Linux Image on VirtualBox.
What's my experience with pricing, setup cost, and licensing?
It is an open-source tool.
What other advice do I have?
I have found the tool to be the most effective when we want to run the vulnerability assessment provided by the solution in our company for certain websites and applications so that we can find or detect issues. In our company, Kali Linux is used for most of the use case scenarios where vulnerability assessment is required.
The areas I found to be the most effective from the perspective of security tasks are Zed Attack Proxy (ZAP), Metasploit, Wireshark, Nikto, and SQLMAP.
There have been a lot of benefits from the pre-installed tools in the product, in terms of security auditing part in our company. There are also other operating systems on which you can run Kali Linux, where users are provided with a massive range of tools like BlackArch Linux and ParrotOS, which are useful for certain use cases.
The product is good to start with, and it is good for penetration testing and vulnerability assessment. It is good for those who want to go into the line of website security. New users of the product should know the basics of Linux to be able to use the solution because it is an area that could be hard for many.
The value derived from the use of the product in our company stems from the results it provides us. The reason to use the product is to get answers when you run a vulnerability assessment from a security perspective. The product provides an outcome that can be used to access the security posture of an application, and it can also help you find loopholes. In general, it can be used to test applications.
I rate the tool a ten out of ten.
Unleashing Power: A Review of Kali Linux
Kali Linux stands out as a robust penetration testing and security auditing platform. Its comprehensive toolkit and user-friendly interface make it invaluable for professionals in cybersecurity.
USER 'KALI' TO LOGIN VIA SSH
A number of previous ratings indicated that ssh login is a problem. Make sure you use the "kali" user for your ssh login.
A highly stable solution that can be used to detect, monitor, and maintain security in an environment
What is our primary use case?
I use Kali Linux to do a simulation attack on another system and show them that the antivirus can protect this system.
What is most valuable?
The most valuable feature of Kali Linux is the attack it performs using a CVE script that's already on the internet. The solution saves a lot of my time because instead of creating a script, I can take the available script and execute it for that machine.
What needs improvement?
I would like to have automation in Kali Linux instead of manually configuring or setting up something in case of an upgrade.
For how long have I used the solution?
I have been using Kali Linux for a couple of months.
What do I think about the stability of the solution?
I rate Kali Linux ten out of ten for stability.
How was the initial setup?
The solution’s initial setup is straightforward.
What about the implementation team?
We implemented the solution through an in-house team. The solution was deployed in 30 minutes. The solution's deployment process is the same as Ubuntu Linux. It depends on the type of Kali Linux you want to install, and then you have to execute it.
What was our ROI?
Each company has an audit, and Kali Linux can be used for vulnerability testing and detecting other system weaknesses in the environment.
What's my experience with pricing, setup cost, and licensing?
Kali Linux is a free product, and you don't have to pay for a license.
What other advice do I have?
Choosing Kali Linux depends on the user's use case. Users who want to have an audit for the network or the endpoint can definitely use Kali Linux. It is a free product, and it has greater capability to detect, monitor, and maintain security in one environment.
Overall, I rate Kali Linux ten out of ten.
Which deployment model are you using for this solution?
Best OS for pentesting
Nice to see Kali Linux on AWS it helps me a lot for Pentesting. I can recommend everyone this AMI.
Great Portable Box
Great OS and I love how mobile/portable it is. I can access from my host machine, VM, and iPad where ever I am. I love the tools it comes with, and how 'light weight' it is at its first occurrence. It's not hardened, however, it is easy to apply protective measures to ensure security. Again, LOVE this and will continue to use in my day-to-day testing.
The Best Operating System for Penetration Testing!
Kali Linux is hands down the Best OS for Cybersecurity Researchers & Penetration Testers while providing the best of tools pre-installed and supporting a wide range of products from Bare Metal to Cloud to Mobile Being the Best OS for Penetration testing