Kali Linux, the most popular security testing platform available today, provides a means for individuals from all walks of life to become more experienced with penetration testing and information security. Kali is not only the cornerstone of many security penetration testing programs, but also has a tremendous community of users who share code, methods, and experiences to help even the most seasoned security practitioners become more effective. As a platform, Kali Linux is quite versatile. It can be run from bootable media, installed onto hardware platforms, or run in virtual environments. It can be enhanced with any number of tools available outside of the native distribution (and we will demonstrate this in the following chapters). It truly gives you the means to have a single platform to work from, in any format you like, without the need for expensive investments in hardware and software.
With the rise of malicious actors and malware, and the increased focus on system and network security, being able to understand how the attacker operates allows you to become more effective at providing balanced and appropriate controls.
In this book, we will explore how to use Kali Linux as well as additional tools such as Nexpose, Nessus, and OpenVAS to perform various types of penetration testing tasks. We will cover how to set up an effective lab for testing purposes and we will also cover many aspects of penetration testing, along with useful advice on how to go about being successful in using the Kali Linux platform.