In this chapter, we learned what Kali Linux is, and the advantages of using it when it is installed on our virtual machine. After that, we looked through the GUI of Kali Linux, including various icons it has. We then used a few Linux commands that we are going to use in future chapters. Finally, we learned how we can update the resources of our system.
The upcoming chapters will focus on network penetration testing. Initially, we will learn all of the fundamentals; later, we will learn the attacks that we can perform on networks.