When it comes to pen-testing or hacking, Kali Linux is the best operating system. It now has over 600 penetration testing tools installed, with a large number of other relevant tools available. Thus, Linux is not a good choice for newcomers. It is a Linux distribution targeted at security experts.
However, if you are still adamant about using Kali Linux, we recommend you read this article till the end. We will provide you with all the necessary steps to take after downloading Kali Linux to ensure your security.
Change Desktop Environment
Kali Linux’s default desktop environment is Xfce. Even on older computers, users note Xfce for being lightweight and speedy.
However, if you want to change your desktop environment, Kali Linux provides you with that option.
If you downloaded the Kali virtual image, Xfce is already installed. You must manually install the desktop environment from the repository to modify the desktop environment after installation or in a virtual image.
To change the desktop environment after installing Kali Linux, all you have to do is enter this code:
sudo apt install -y kali-desktop-xfce
Git is a version management system for open-source software. It can be used for collaboratively sharing and editing code. However, it is most widely used for copying (or “cloning”) code repositories from GitHub. For penetration testers wishing to expand their toolkit beyond what’s provided in the basic Kali repositories, Git is a must-have.
Updating Kali Linux
The first thing you should do after installing Kali Linux is to keep it up to date. To accomplish this, we must first update the repository and then upgrade our system. If you want to avoid working with an out-of-date system and tools, updating and upgrading is a critical first step.
To update and upgrade Kali Linux, follow the steps below:
- Open a Terminal in Kali
- Run the code:
sudo apt update -y && sudo apt upgrade -y
Moreover, if your system requires a cleanse from unrequired packages and files, run the following command:
sudo apt autoremove -y
The permission denied error occurs frequently when you are performing tasks. When you run a command, you should be aware if you’re doing it as root or as a regular user.
The execution of an incorrect command with root access can result in serious consequences.
It’s best to log in as a regular user and switch to the root account only when necessary. To get root privileges, use the sudo command. To become a root user, you will require the use of a password.
Configure Bash Aliases
To create custom command-line shortcuts, bash aliases are the way to go. To employ our preferred arguments, we can reassign the ‘Is’ command automatically.
Through the ‘Is’ command, the output you receive is more detailed. Furthermore, it will structure it in a listed format as well, which it then prints in a readable size font.
To add aliases, open the following aliases through nano or your preferred text editor:
And, in order to create an alias, run the following command:
Alias Is='Is –color=always -rthla