Pre-installed tools can provide basic training and security measures, which is helpful. However, these tools may not be sufficient to secure your workload fully. That's why it's important to complement them with other specialized security tools to enhance your overall security. Before using Kali Linux, make sure you know its pros and cons. It's a good system to learn because it's the best choice for some situations. It has default firewall settings that block everything by default. It's up to the user to decide how much they want to open up. Learning Kali Linux takes time because it relies on command-line tasks instead of graphical interfaces. Practice is key to becoming comfortable with it.
I strongly recommend the product to others who plan to use it since it is a reliable tool. When it comes to the learning curve for new users who plan to use the product, I would say that if someone is not familiar with cybersecurity, then they would need at least six months to a year to learn about the product. In terms of the value derived from the use of the product, I could see that with the solution, I was able to see the vulnerabilities. I rate the solution an eight out of ten.
Cyber Security Consultant - APAC at Logon Software
Real User
Top 5
2024-04-17T10:25:17Z
Apr 17, 2024
Kali Linux is a beginner tool. You can use it for testing and practicing. However, using it for real-time attacks can pose legal issues. Users can perform penetration testing but should refrain from attacking real company websites. The tool is useful for personal use, such as for hackers or for conducting penetration testing and gathering information for review purposes. However, using it for unauthorized or suspicious activities could lead to legal repercussions. I rate the overall product an eight out of ten. Hackers could potentially use it as a weapon to attack any company or website.
I have found the tool to be the most effective when we want to run the vulnerability assessment provided by the solution in our company for certain websites and applications so that we can find or detect issues. In our company, Kali Linux is used for most of the use case scenarios where vulnerability assessment is required. The areas I found to be the most effective from the perspective of security tasks are Zed Attack Proxy (ZAP), Metasploit, Wireshark, Nikto, and SQLMAP. There have been a lot of benefits from the pre-installed tools in the product, in terms of security auditing part in our company. There are also other operating systems on which you can run Kali Linux, where users are provided with a massive range of tools like BlackArch Linux and ParrotOS, which are useful for certain use cases. The product is good to start with, and it is good for penetration testing and vulnerability assessment. It is good for those who want to go into the line of website security. New users of the product should know the basics of Linux to be able to use the solution because it is an area that could be hard for many. The value derived from the use of the product in our company stems from the results it provides us. The reason to use the product is to get answers when you run a vulnerability assessment from a security perspective. The product provides an outcome that can be used to access the security posture of an application, and it can also help you find loopholes. In general, it can be used to test applications. I rate the tool a ten out of ten.
Choosing Kali Linux depends on the user's use case. Users who want to have an audit for the network or the endpoint can definitely use Kali Linux. It is a free product, and it has greater capability to detect, monitor, and maintain security in one environment. Overall, I rate Kali Linux ten out of ten.
Kali Linux is widely used by organizations for penetration testing, vulnerability assessments, web application security, network audits, ethical hacking, and open-source intelligence, providing extensive free features.
Organizations run Kali Linux in virtualized environments alongside other operating systems, employing tools for automated scans, malware identification, infrastructure testing, and application development or hosting. These users benefit from lower maintenance requirements...
Pre-installed tools can provide basic training and security measures, which is helpful. However, these tools may not be sufficient to secure your workload fully. That's why it's important to complement them with other specialized security tools to enhance your overall security. Before using Kali Linux, make sure you know its pros and cons. It's a good system to learn because it's the best choice for some situations. It has default firewall settings that block everything by default. It's up to the user to decide how much they want to open up. Learning Kali Linux takes time because it relies on command-line tasks instead of graphical interfaces. Practice is key to becoming comfortable with it.
I strongly recommend the product to others who plan to use it since it is a reliable tool. When it comes to the learning curve for new users who plan to use the product, I would say that if someone is not familiar with cybersecurity, then they would need at least six months to a year to learn about the product. In terms of the value derived from the use of the product, I could see that with the solution, I was able to see the vulnerabilities. I rate the solution an eight out of ten.
Kali Linux is a beginner tool. You can use it for testing and practicing. However, using it for real-time attacks can pose legal issues. Users can perform penetration testing but should refrain from attacking real company websites. The tool is useful for personal use, such as for hackers or for conducting penetration testing and gathering information for review purposes. However, using it for unauthorized or suspicious activities could lead to legal repercussions. I rate the overall product an eight out of ten. Hackers could potentially use it as a weapon to attack any company or website.
I have found the tool to be the most effective when we want to run the vulnerability assessment provided by the solution in our company for certain websites and applications so that we can find or detect issues. In our company, Kali Linux is used for most of the use case scenarios where vulnerability assessment is required. The areas I found to be the most effective from the perspective of security tasks are Zed Attack Proxy (ZAP), Metasploit, Wireshark, Nikto, and SQLMAP. There have been a lot of benefits from the pre-installed tools in the product, in terms of security auditing part in our company. There are also other operating systems on which you can run Kali Linux, where users are provided with a massive range of tools like BlackArch Linux and ParrotOS, which are useful for certain use cases. The product is good to start with, and it is good for penetration testing and vulnerability assessment. It is good for those who want to go into the line of website security. New users of the product should know the basics of Linux to be able to use the solution because it is an area that could be hard for many. The value derived from the use of the product in our company stems from the results it provides us. The reason to use the product is to get answers when you run a vulnerability assessment from a security perspective. The product provides an outcome that can be used to access the security posture of an application, and it can also help you find loopholes. In general, it can be used to test applications. I rate the tool a ten out of ten.
Overall, I rate the solution a nine out of ten.
I recommend the solution to those who plan to use it. I rate the overall tool a nine out of ten.
Choosing Kali Linux depends on the user's use case. Users who want to have an audit for the network or the endpoint can definitely use Kali Linux. It is a free product, and it has greater capability to detect, monitor, and maintain security in one environment. Overall, I rate Kali Linux ten out of ten.