Cyber Security Consultant - APAC at Logon Software
Real User
Top 5
2024-04-17T10:25:17Z
Apr 17, 2024
Kali Linux is a beginner tool. You can use it for testing and practicing. However, using it for real-time attacks can pose legal issues. Users can perform penetration testing but should refrain from attacking real company websites. The tool is useful for personal use, such as for hackers or for conducting penetration testing and gathering information for review purposes. However, using it for unauthorized or suspicious activities could lead to legal repercussions. I rate the overall product an eight out of ten. Hackers could potentially use it as a weapon to attack any company or website.
I have found the tool to be the most effective when we want to run the vulnerability assessment provided by the solution in our company for certain websites and applications so that we can find or detect issues. In our company, Kali Linux is used for most of the use case scenarios where vulnerability assessment is required. The areas I found to be the most effective from the perspective of security tasks are Zed Attack Proxy (ZAP), Metasploit, Wireshark, Nikto, and SQLMAP. There have been a lot of benefits from the pre-installed tools in the product, in terms of security auditing part in our company. There are also other operating systems on which you can run Kali Linux, where users are provided with a massive range of tools like BlackArch Linux and ParrotOS, which are useful for certain use cases. The product is good to start with, and it is good for penetration testing and vulnerability assessment. It is good for those who want to go into the line of website security. New users of the product should know the basics of Linux to be able to use the solution because it is an area that could be hard for many. The value derived from the use of the product in our company stems from the results it provides us. The reason to use the product is to get answers when you run a vulnerability assessment from a security perspective. The product provides an outcome that can be used to access the security posture of an application, and it can also help you find loopholes. In general, it can be used to test applications. I rate the tool a ten out of ten.
Choosing Kali Linux depends on the user's use case. Users who want to have an audit for the network or the endpoint can definitely use Kali Linux. It is a free product, and it has greater capability to detect, monitor, and maintain security in one environment. Overall, I rate Kali Linux ten out of ten.
Kali Linux is an open-source, Debian-based Linux distribution geared towards various information security tasks, such as Penetration Testing, Security Research, Computer Forensics and Reverse Engineering.
Kali Linux is an open-source, Debian-based Linux distribution geared towards various information security tasks, such as Penetration Testing, Security Research, Computer Forensics and Reverse Engineering.
A version of Kali is always close to you, no matter where you need it. Mobile devices,...
Kali Linux is a beginner tool. You can use it for testing and practicing. However, using it for real-time attacks can pose legal issues. Users can perform penetration testing but should refrain from attacking real company websites. The tool is useful for personal use, such as for hackers or for conducting penetration testing and gathering information for review purposes. However, using it for unauthorized or suspicious activities could lead to legal repercussions. I rate the overall product an eight out of ten. Hackers could potentially use it as a weapon to attack any company or website.
I have found the tool to be the most effective when we want to run the vulnerability assessment provided by the solution in our company for certain websites and applications so that we can find or detect issues. In our company, Kali Linux is used for most of the use case scenarios where vulnerability assessment is required. The areas I found to be the most effective from the perspective of security tasks are Zed Attack Proxy (ZAP), Metasploit, Wireshark, Nikto, and SQLMAP. There have been a lot of benefits from the pre-installed tools in the product, in terms of security auditing part in our company. There are also other operating systems on which you can run Kali Linux, where users are provided with a massive range of tools like BlackArch Linux and ParrotOS, which are useful for certain use cases. The product is good to start with, and it is good for penetration testing and vulnerability assessment. It is good for those who want to go into the line of website security. New users of the product should know the basics of Linux to be able to use the solution because it is an area that could be hard for many. The value derived from the use of the product in our company stems from the results it provides us. The reason to use the product is to get answers when you run a vulnerability assessment from a security perspective. The product provides an outcome that can be used to access the security posture of an application, and it can also help you find loopholes. In general, it can be used to test applications. I rate the tool a ten out of ten.
Overall, I rate the solution a nine out of ten.
I recommend the solution to those who plan to use it. I rate the overall tool a nine out of ten.
Choosing Kali Linux depends on the user's use case. Users who want to have an audit for the network or the endpoint can definitely use Kali Linux. It is a free product, and it has greater capability to detect, monitor, and maintain security in one environment. Overall, I rate Kali Linux ten out of ten.