Showing posts with label How To's. Show all posts
Showing posts with label How To's. Show all posts
Wanna carry your Linux everywhere you go? It'll be a good idea to learn how to install Kali for Android phones.

How to Install Kali Linux on Android

Kali can be called a penetration testing Linux distro used by cryptographers and digital forensics. If you have no prior knowledge on this OS, you might wanna refer to HOW TO INSTALL KALI LINUX ON A SYSTEM since I've already broken it all down as well as installation tutorial on computers.

Penetration testing entails making use of a variety of tools and techniques in testing the limits of security procedures and policies. These days more apps are made available on the Android OS for smartphones and tablets every day, so it becomes somewhat worthwhile to have Kali Linux on your smartphone.

Unlike the Computer installation, follow the below steps closely and you'll find the android installation pretty easy


  • Android version 2.0 or higher
  • Full battery life
  • Nothing less than 5Gb of memory space (both internal and external)
  • A strong internet connection
I believe you have the above specs so let's continue; Rooted Android phones are required for this to work, so lemme start there:

1. Rooting Your Android Phone

Left to me I'd say have your phone rooted by an expert because a little mistake on your part might screw up your phone. However, if you can do it, what you first need to do is back up your phone data.

When that is done, go activate EOM unlocking and USB debugging in the smartphone's developer settings.

When the above steps are completed, head over to the Google developers site and download Android SDK tools and install it in a default directory. Or you can install it anywhere you can remember.

Uncheck everything in the displayed tab, then click to install two packages.

Note that this step is only for those with unrooted Android.

Install By Accepting Licenses

Find your way to your Android phone's manufacturer site and install the device drivers. Make sure the bootloader is unlocked.

Note that certain devices will ask you for an unlock key. Restart your Android to fastboot mode (done by pressing volume up+power on most devices).

Open a command prompt on your personal computer.

If your device requires a code, copy and paste it on your manufacturer's website. After the website form is submitted, you'll receive an email from your device manufacturer that contains a file, key and other necessary instructions for rooting your smartphone.

Get Kingo Root

How to Install Kali Linux on Android
Go and download the KingoRoot app from google play store. If you don't find it, a little google search will fix you. Install the application and make certain your phone is connected to your personal computer. 

Enable the debugging stuff in your Android and root your device.

2. Set up Linux deploy for Kali

How to Install Kali Linux on Android

NOTE for this procedure: Your Android phone should be rooted or have near you a rooting guide for your phone brand.

Download and install Linux deploy application from Google play store. Click on the download icon and select Kali distributions in the distributions tab.

Choose your installation type and location as well. You may decide to stick with the default settings but I recommend configuring up the deployment app yourself.

3. Installation

After configuring all the necessary stuff: You can go ahead to build the Kali image by pressing the install button at the top of the screen. This should take less than 5 minutes depending on your internet speed.

Installation boots a Kali Linux bootstrap directly from the Kali repository. By now Kali Linux is successfully installed.

4. VNC viewer app(optional)

Go download the VNC viewer app from google play store.

Now the steps to configure your VNC:

  • set Address to localhost 

  • set name to kali

When you must have finished the above steps, press the connect button and you'll find your Kali running on your Android.

How to Install Kali Linux on Android | installationThe Kali installation is prebuilt with a VNC or SSH server thus dropping the need to download one. So this step is optional.

5. The CHROOT mode

How to Install Kali Linux on Android | Chroot mode
Now you're done with the installation, let the Linux deploy mount and load your Kali Linux chroot image automatically. 

This step also means the start-up of SSH and VNC  servers to enhance easier remote access. Press the START symbol and this process will begin.

Note the IP address of your device. You'll be using it to log in to your kali session.

log in to chroot mode

Either use the SSH or VNC client to get yourself into your kali. The default VNC setup will be as follows;

  • username: android

  • Password/key: change

Important stuff you need know on using Kali Linux on Android

Linux deploy normally allocates 4GB of image size for a naked installation of kali. It is recommended you reconfigure the settings of the image size at the Linux deploy in case you need to install more utilities that might require huge space.

You might wanna check out how to use your Android as a security camera

Gotta use Tor browser properly right? Yeah, being anonymous while surfing online is a great idea.

NIPE: How to Anonymize your system completely with Tor

Tor is arguably the most popular onion browser out there, being able to run on Apple MacOS, Microsoft Windows and GNU/Linux(without installing any software).

Confused on what Tor actually is? Lemme put it this way; 

Tor browser protects your anonymity by bouncing your communications around a range of distributed networks of relay runs by aides all around the globe: it prohibits and ensures that somebody watching your Internet connection does not learn what sites you visit, it prevents the websites you browse through from knowing your physical location, and also lets you visit blocked websites.

Now, what is Nipe?

Nipe simply put, is a script to make Tor Network your Default Gateway.

This little Perl Script gives you access to route all your traffic directly from your
computer to the Tor Network. 

After it is all done, you can successfully surf the Internet Anonymously
without any worries of being tracked or traced back.

Let's get to it!

Download and install:

    cd nipe
    cpan install Switch JSON LWP::UserAgent

Commands needed:

    install                Install dependencies
    start                   Start routing
    stop                   Stop routing
    restart                Restart the Nipe process
    status                 See status


    perl install
    perl start
    perl stop
    perl restart
    perl status

As a new guy in the hacking world, I bet you'd want to know how to create a virtual hacking lab. If you don't know what this is or you just don't care enough to create one, I suggest you read this post thoroughly because it is highly essential.

How to Create a Virtual Hacking Lab

The hacking lab creates a safe environment to practice your hacks. This way you won't have to worry about the risk of failure when trying a hack in the real world because any slip off can be devastating.

Hacking isn't like most professions. In most, you fail and dust yourself off. But in this, you fail and probably spend some time behind bars. This makes practising very important, and this is where the virtual hacking lab comes in.

Many newbies find it pretty difficult to set up a dedicated lab to practice hacks. This article does justice to this problem.

I'll be breaking the tutorial down in 6 steps to make it easier to comprehend;

  1. Download VMware Workstation or Player
  2. Download Kali VMware Images
  3. Unzip Images
  4. Open VMware Image
  5. Download & Install Targets
  6. Download Old Applications

Let's go!

Step 1: Download VMware Workstation or Player

You should practice hacking within a virtual environment. You set up a hacking system like Kali Linux, and some victims to exploit. Essentially, you'll likely want multiple OS and software to enable you try out a variety of hacks.

How to Create a Virtual Hacking Lab

Virtual machines and a virtual network offer the safest way to set up a hacking lab. 

There are numerous virtualization systems available, including Oracle's VirtualBox, KVM, Microsoft's Virtual PC and Hyper-V, Citrix, and VMware's Workstation, VMware Player and ESXi.

In a case of a lab environment, I recommend VMware's Workstation or Player. The workstation is a purchasable product that costs as high as $200 after the free 30-day trial, while the Player is free-to-use.

The difference between these two is that the Workstation can both create and play, while the Player is used to just play VMs.

Download VMware's Workstation or Player here.

Step 2; Download Kali VMware Images

After you must have installed the virtualization system, your next step is to download the VMware images of Linux(provided by offensive language). These images help you to run from Workstation or player instead of creating a virtual machine. 

These images have already been created by Offensive Security. This basically means that you can then use it in either Workstation or Player once you download the VM of Kali.

Step 3; Unzip Images

You need to unzip the downloaded files using one of the several free available zip utilities like WinZip, WinArchiver, etc. 

Download and install the one that suits your fancy and unzip the files. The screenshot below shows the unzipped Kali files using the free trial of WinZip.

Step 4; Open VMware Image

When you must have unzipped all the files, your next step is to open up the virtual machine. Be sure to know the location you unzipped the VM image.

Next is to open the Player or the VMware Workstation. Go to file and open like in the below image.

How to Create a Virtual Hacking Lab

This opens a window like in the below image.

This shows the VMware VM file that you're gonna load into VMware. Note that I'm using the "amd64" which is simply the 64-bit version. The 32-bit version will work though, but a lil bit slower.

Next, after you do so, VMware starts your VM and displays the below image.

Now, hit the little green button in your screen that says "Power on this virtual machine." It will now display a Kali screen.

How to Create a Virtual Hacking Lab

Use "root" as User and "toor" as Password to get started hacking!

Step 5; Download & Install Targets

Now, download and install your target system. You could use your own host Windows system since this is merely a practice, you might wanna use an older and easier to hack system. 

I recommend installing a Windows Vista, XP, Server 2003, or an older version of Linux. You can use these systems to practice hacking since they have known security vulnerabilities. Later, when you think you're climbing up the ladder, you can now install and use Windows 7 and 8 for your hacks.

If you don't have a copy of these older OS, you can easily purchase them on the internet. At last check, it was sold for as low as $9.66 on Amazon, but that can change anytime.

Alternatively, you can get these OS for free on torrent sites, but BEWARE!'ll likely be downloading more than you bargained for.

These free downloads often come with rootkits that embed in your system when you open the file.

You can get older versions of Linux from the distribution.


Step 6; Download Old Applications

Now that you have your operating system, you're gonna be needing apps and software to run on these older versions. These older versions have plenty known security flaws that you can check your hacking skills.

You can use the website "Old Apps" to download many of these.

How to Create a Virtual Hacking Lab

Hit me up in the comment section if you got stuff to say or add on how to create a virtual hacking lab.

Subscribe to my mailing list

* indicates required

Hi there✋. 

Have you ever wondered how easy or possible it is to hack into your pal's computer? Or maybe you know it's possible but do not know the steps to follow. 

I say to you; bring out your note if you ain't with your computer. Keep reading lad.

I've always been asked by viewers on how to hack a computer. I'll be showing you one of my tricks. This trick is done in 4 steps;

  1. Getting started
  2. Trial and error
  3. Gathering necessary information
  4. Getting in

Before you keep reading though, i'll suggest you take a look at our disclaimer page.
Let's get to work!

How to hack into A Computer connected to the same network(Lan)

This trick is perfect for those working in an office where everyone is connected to the same network. It can also be carried out in a College.

What you need

  • Windows OS
  • Cain and Abel

The obvious first thing to do is find a Computer to hack into. You can begin if you're connected to the WAN or plugged into the LAN.

Open up your Cain and Abel. Get it here if you don't have it installed,

This hacking program has a built-in sniffer feature that looks for all available IP addresses in a local subnet. 

Now pay attention!

Step 1

Getting started!

Click on the sniffer tab after the software opens. Click the Start/Stop sniffer, and click the blue cross.

5 Easy steps to Hack Into a Computer

Another window will pop up after this, select “All host in my subnet” and click ok.

It'll now begin to scan

5 Easy steps to Hack Into a Computer

The Computer names, IP's and mac addresses will display. Write them down and try to remember the IP address you wish to hack into. It's okay if you can't tell whether the IP address belongs to a Computer, modem, router etc.

The next step will tell you what to do.

Step 2

Trial and error

This stage is here in case you don't know if what you have is a Computer, printer, router or whatever else is connected to the WAN.

If you did get the IP address of the target though, I still recommend you read through this

Click on the start menu, type in cmd, and click ok.

This will bring up the command prompt which is where you'll be doing most of the hacking.

Next, you'll be reading certain commands in quotes that you'll need to be input into the command prompt. Do not by any way put these commands in quotes. It won't work. I put quotes only to avoid confusing you.

Type in “ping (IP address of the target).” For example in this tutorial, “ping”

This lets you know if the target is online or not

It will look something like this if the target is online.

5 Easy steps to Hack Into a Computer

It will look like this if the target is offline:

5 Easy steps to Hack Into a Computer

This hack can only be done if the target is online. So switch to a different target if it's not or wait for it to come online.

You'd wanna know how to crack a wifi password and a website

Step 3

Gathering necessary information.

Input this command “nbtstat –a (IP address of target).” A suitable example would be
“nbtstat –a”

This will display if file sharing is enabled. If it is, it will give you the; currently logged on user,  computer name and workgroup.

5 Easy steps to Hack Into a Computer

Step 4

Getting In

It’s time!.

By now you should know that: your target is online, has file sharing, and the computer name.

Locate the shared drives or printers. Type “net view (IP Address of Target)”
Example for this tutorial would be: “net view”

You just found the share name. In this case, "C" is under the share name signalling that C is the only shared thing on the PC or computer.

To the right, "Disk" is displayed under Type. Meaning that it is the actual C DISK of the computer. The C DISK is most times an entire person’s hard drive.

If you observe carefully, for my hack I already used “K,” so now I use “G” instead. You may do the same for multiple hacks.

It will say “The command completed successfully.” if it worked.

You may have to go retrace your steps if it didn't.

Now open “my computer” under the start menu. There your recently created network
drive will be there.

Note that you won't be able to access this drive if you disconnect from the WAN or LAN. Hence the name Network Drive.

Don't worry though, you won't have to repeat the same procedure all over again since the drive will not be deleted after you disconnect. You can still access it whenever you reconnect.

Congratulations! You’re DONE HACKING!

Commands used;

  • PING
  • NBTSTAT -a (IP Address of Target)
  • NET VIEW (IP Address of Target)
  • NET USE K: (IP Address of Target)(SHARENAME)

Program used;

Cain and Abel.

Pretty easy right? this sums up the steps to hack into a Computer.

Subscribe to my mailing list

* indicates required

how to hack a wifi password using kali linux

Frequently asked question online, how to hack a wifi password! Most people will probably answer by referring you to funny phone apps lol. I’m not gonna do that, instead, I’ll share with you a better and more efficient way of pulling off this hack; How to hack a wifi password and get connected using Kali Linux.

Plus this method is a bonus since it exposes you a little to the hack hood.

I didn’t want to give you, my audience what you can easily find elsewhere on the net, so I went to work and manipulated some commands using Kali.

I’m sure you’re quite familiar with and already installed Kali Linux, if not, you’re in luck because I’ve pretty much covered it here.

The purpose of this particular attack is to capture as many traffic as we can get using airodump-ng. Each data packet has an associated 3-byte Initialization Vector called IV’s.

The goal after the hack is initiated is to obtain as many encrypted IV’s as possible, then use aircrack-ng on the captured file to reveal the password.

Don’t know much about hacking? Worry not bro/sis, because we’re gonna do it together.

Get your computer.


The very first thing we’ll need to do is to verify the router configuration. Normally we wouldn’t have this option in a real penetration test, but we got some flexibility since we’re operating in a home lab.

For the purpose of this tutorial, the passphrase Cisco123 is used in the lab access point to secure the wireless network with WPA2-PSK.

Use any wireless router to set up your wireless lab.

Setup an old router, log in and set it up as WEP, so wireless security can use it as a test router.

Connect your phone or any other device to its wireless. This is so to capture the encrypted data between the two.


The iwconfig command will show all wireless cards in any system. We'll use a RealTek wireless card(this is a Linux plug and play wireless card).

The operating system will recognize a wireless interface called Wlan0

how to hack a wifi password using kali linux


The next step we’ll make is to enable the wireless interface. This is done using the ifconfig wlan0 up command.

how to hack a wifi password using kali linux


Now, you need to know the specific wireless network your wireless card sees. So carry out the iwlist wlan0 scanning command.

how to hack a wifi password using kali linux

This command instructs the wireless card to reveal all wireless networks in your area.
You’ll clearly see in the below image that it found my target network; wireless lab.

It found also the MAC address of my access point; 0E:18:1A:36:D6:22. It’s important you note yours’s because you’d want to limit your attack to a specific access point to ensure you’re not breaking into anyone’s password(Illegal bruh).

Also, note the fact that the AP is transmitting on channel 36. This is important because it allows you to know what wireless channel you’ll want your wireless card to capture traffic from.

how to hack a wifi password using kali linux


Change the wireless card to monitoring mode. This allows the wireless card to check all the packets available.

You can do this by creating a monitor interface using airmon-ng. Issue this command to verify that airmon-ng sees your wireless card.

Create the monitor interface by writing the command; airmon-ng start wlan0

how to hack a wifi password using kali linux

Run the ifconfig command to verify that the monitor interface has been created.

how to hack a wifi password using kali linux

Now verify that the mono interface has been created.

how to hack a wifi password using kali linux


Use the airodump-ng to capture the WPA2 handshake. Airodump-ng will show a valid handshake when it captures it. This will be shown in the upper right-hand corner of your computer screen.

You’ll have to manually connect to the wireless to force a handshake. I’ll soon write an article describing how to force a reauthorization, making a device automatically disconnect and reconnect with no need for a manual intervention.

Use the command in this format; airodump-ng mon0 --bssid 20:aa:4b:1f:b0:10 =used to capture packets from your AP

--channel 6 =limits channel hopping

--write BreakingWPA2 =the name of the file you wish to save to

Airodump-ng mon0 --bssid 0E:18:1A:36:D6:22 --channel 36 --write breakingWPA2


To successfully capture the handshake, you’re gonna monitor a legitimate client to authenticate to the network.

To fix the hassle of having to wait for a client to legitimately authenticate. I’m gonna show you to force a client to re-authenticate.

Look out for the WPA Handshake Command, this tells you that you just captured a valid handshake.


Now, we’re gonna use aircrack-ng together with the dictionary file to crack the password.
Our chances of breaking into the password are largely dependent on the password file.

The command is; aircrack-ng “title of the cap file you created and stored” –W “title of your dictionary file”

The BreakingWPA2-01.cap file was created when we ran the airodump-ng command. The valid WPA2 captured airodump handshake is saved in the BreakingWPA2-01.cap file

Backtrack 5 comes with a basic dictionary, darkc0de.lst. This is a popular worldlist that ships with BackTrack5. We used our password Cisco123 in this file to make the test run smoother. Many hackers use large dictionaries which increases their chances of cracking passwords. Lots of dictionaries contain passwords from real users and websites that was cracked and posted on the web.

You can download the darkc0de.Ist here since Kali Linux does not come with it preinstalled.

If the password is found in the dictionary file, rest assured that aircrack-ng will crack it and you'll be able to connect.

how to hack a wifi password using kali linux


Whew, just got that out of the way.

Now, let's hope my hack also works for you. If it doesn't, hit me up. We'll figure it out together.

Now check out how you can hack into a computer

how to hack a wifi password using kali linux
Learning how to hack a wifi password using Kali linux is only complicated when you try to use someone else's hacking technique.

My job is to turn you into a real hacker, that way you can also manipulate your own hacks.

Don't forget to join me on Facebook.

Subscribe to my mailing list

* indicates required

how to install kali linux in 2018

Hi, do you have trouble installing Kali Linux on your desktop/laptop? are you here just to see what all the hype on the Operating system is about?  What if I tell you Kali Linux isn’t just an OS? -)

Yeah I know you might be thinking, “here we go again”, “what does he have to share that I can’t get elsewhere online”.

For that I tell you; get a chair, grab a cup of coffee if you can, and watch me blow your mind.

What you need to know about Kali Linux

Kali Linux is a Debian Linux distribution, intended to carry out digital forensics and penetration testing. It is funded by Offensive Security Ltd. Mati Aharoni, Raphaël Hertzog and Devon Kearns are the core developers, and blah blah blah!

Do you understand 70% of what I just said up there? I wouldn’t. My job is to speak English when explaining stuff like this, otherwise, you’ll most likely not grab anything new from this article.

Let’s try again, now, in English.

Debian is comprised entirely of free software and a Unix-like OS. Which basically means that it operates in a manner similar to a Unix system, while not automatically conforming to versions of the Single UNIX Specification.

Digital forensics is a branch of forensic science(use of technology to establish facts and evidence) surrounding the recovery and investigation of material found in digital devices, often in relation to cybercrime.

A penetration test(also known as a pen test), is an authorized virtual attack on a computer system, performed to review and evaluate the security of the system. The test is carried out to identify vulnerabilities, as well as strengths.

Now let’s go back to what Kali Linux is, shall we?

Kali in a layman’s term is a free-to-download OS(as free as getting a beer at a party), that is used to check the strengths and weaknesses of a computer. It can also be used to recover data in any digital device.

installing kali linux made easy

Kali Linux includes security tools, such as

  • Aircrack-ng
  • Burp suite(Burp or Burp Suite is a graphical tool for testing Web application security)
  • Ettercap(It can be used for computer network protocol analysis and security auditing)
  • John the Ripper(a free password cracking software tool
  • Kismet(this is a network detector)
  • Maltego(a proprietary software used for open-source intelligence and forensics)
  • Metasploit framework(This is a computer security project that provides information on security vulnerabilities and helps in penetration testing and IDS signature development)
  • Nmap(a security scanner that is basically used to discover hosts and services on any computer network)
  • OWASP ZAP(an open-source web application security scanner)
  • Social engineering tools.
  • Wireshark(used for network troubleshooting, analysis, software and communications protocol development)
  • Hydra
  • Reverse Engineering tools
  • Forensics tools like Binwalk, Foremost, Volatility e.t.c

Should I install and use Kali Linux?

Have I aroused your interest? Wanna jump right in the Kali Linux hood? Not so fast buddy.
Kali is great but complicated. Even for experienced users, the operating system can pose some challenges.

While Kali Linux is architected to be greatly customizable, don’t presume you’ll be able to add random unrelated packages and repositories that are “out of band” of the normal Kali software sources and expect it work just fine.

If you are alien with Linux, if you lack at least, an essential level of competence in managing a system, if you are searching for a Linux-distribution only for learning purposes, if you want it just to get to know your way around Linux, or if you want a tool that you can use as a general purpose desktop installation.

Then, my friend, Kali Linux is probably not what you are looking for just yet. You may want to start with UbuntuMint, or Debian instead.

Now, let's dive into the main topic fam; how to install Kali Linux in 15 simple steps.

Setup to install Kali Linux

  • ·         Virtual Machine (VMWare, VirtualBox)
  • ·         μTorrent/BitTorrent

Step 1

Install VirtualBox version 4.3.12. The latest updates tend to have little issues with antivirus, so Ignore for now.

Step 2

Download Kali Linux 32 bit ISO’, with the torrent. The direct version will take too long to download. REMEMBER, torrent.

Step 3

Now, open your VirtualBox and click on New(top left). Name it Kali Linux 1.0.7(or whatever version you downloaded) and it’ll automatically choose the type(Linux) and the version. All you need do now is change it to Debian(32 bits).

Step 4

Tap the Next button and choose the RAM you want to use in this OS. Let’s say 1GB of RAM, though think 500MB should be enough.

Step 5

Tap Next again. Now, choose 'Create a virtual hard drive now' option and click 'Create' choose VMDK option, and hit 'Next' once again, choose 'Dynamically allocated', and 'Next' again.

Step 6

Next thing to do is to choose the size of the compartition you'll be using to make the Virtual Machine. I’ll say choose 30GB for that, but 20GB will do just fine. After that, find your way to the top area, where you’ll choose the location of the compartition. Hit 'Create'.

Step 7

By now you’ve successfully created the partition. Next, is to click on that partition, and hit Settings at the top left. Click on System>Processor and check the box Enable PAEX/NX. Now, go to storage>Controller: IDE you’ll find a little CD that’ll indicate Empty. Click on the little CD with an Add symbol and select choose Disk. Now, browse the ISO File you just downloaded(the Kali Linux ISO File), once you've done that click Ok.

Step 8

Go to Network, you’ll find where it says 'Attached to:', there, you choose 'Host-only Adapter'.

Step 9

Exit the Settings Menu, and start the Virtual Machine by clicking the 'Start' button at the top left. Right now, a window must have appeared where you’ll have to make a choice. Go down to the option 'Install' and hit Enter to continue.

Step 10

At this stage, you’ll be prompted to state your country, language and the keyboard. Select the right information! Now Kali Linux will load.

When that is complete, you’ll be asked for the hostname and domain name. But that doesn’t really matter, go ahead and choose kalilinux for the hostname and kalilinux01 for the domain name.

Now, you’ll be asked for the Root Password. Type in 'toor', which is root written backwards. Re-type it when it asks you again. Use root as username if your's ask for it.

Select your Time Zone, then, it’ll load for a bit. Select the 'Partitioning method' as the 'Guide - use entire disk'.

Keep hitting Enter to choose the defaults. After that, hit 'Finish partitioning and write changes to disk'.

You’ll be asked 'Write changes to disks?', select 'Yes'. Now, the OS will start installing. Take a break, because it’ll take like 20-30 minutes.

Step 11

After some time, it’ll ask you, 'Use a network mirror?', click yes. Then you’ll be asked for HTTP Proxy Information, leave it empty. It’ll go ahead and download some files from the network mirror.

Step 12

After that is done, it’ll ask you, 'Install the GRUB boot loader to the master boot record?', select 'Yes', then finally you’ll see 'Installation Complete'. Hit 'Continue'.

Step 13

Kali Linux will restart, after that, a window will appear with the option 'Other...', click on it and you’ll be asked for username and password. Recall that the username is 'root' and the password is 'toor'.

Step 14

Kali Linux is installed. But don’t rejoice just yet -) now, my friend, you will update and upgrade.
For that, go to: Applications (top left) >Acessories>Terminal, and a window like cmd will open, write on it: apt-get update && apt-get -y upgrade && apt-get -y install dkms | I hope you made no mistake in typing those? It’s really important you didn’t.

Now, hit Enter. After the installation is complete, write power off, and the Virtual Machine will turn off.

Step 15

Your Kali Linux OS is installed, and good to go. Recall, you’ll be using root as username and toor as password.

Enjoy your Kali Linux

Subscribe to my mailing list

* indicates required