How to Install Kali Linux on VirtualBox [Windows Host] in 2020

Kali Linux is a Debian based Linux distribution, released on the 13th March 2013 as a complete rebuild of BackTrack Linux. It is one of the best Linux distributions for hacking and security testing, comes with an enormous amount of penetration testing tools from various fields of security and forensics that can be used to determine an organization’s loophole in a risk mitigation project.

One of its main features is that it can run on any type of devices, including 32-bit, 64-bit Intel and AMD processors as well as the Raspberry Pi.

We are going to install Kali Linux on a virtual box and will use it as a regular application in Windows system.

Prerequisites:

  1. VirtualBox should be installed
  2. At least 4GB of RAM is required
  3. At least 30GB to 40GB of free disk space
  4. Virtualization feature should enable on the processor

Installation Steps:

Step 1:  Download Kali Linux ISO image file

You can find it on the official download page: https://www.kali.org/downloads/

Select the image of your choice based on your requirements.

Download Kali Linux ISO image file

Step 2: Create a guest OS on VirtualBox

After downloading an image file open up VirtualBox

Create a guest OS on VirtualBox

Select type as Linux, version Debian (64-bit) as you will not be able to find Kali Linux in option and then type any name of your choice in the Name bar

Select type as Linux

Select the amount of memory of your choice. The recommended memory is at least 1GB but you can select it based upon your system’s resources

Select the amount of memory of your choice

We are going to create a Virtual Hard drive so choose second option that says “Create a virtual hard disk now”

Create a virtual hard disk now

Next it will ask hard drive file type so leave it default as we want to make a VDI file

Make a VDI file

It will ask the storage on the physical hard drive, select this option based upon your requirement. The best practice is to select as default i.e. “Dynamically allocated”

Dynamically allocated

Allocate memory to your machine as required, minimum requirement is 20GB. If you select less than 20GB then it will show some errors while installing.  After allocating memory select the tab “Create”

Allocate memory to your machine

Your VM will be created

VM will be created

 Step3: Select an image file and install Kali Linux

Now select the VM Kali and go to settings for more configuration

Go to System tab and select Processor, here you can choose number of processors depends upon how many processors you want to give your virtual machine. Select 2 from the right side bar

Select an image file and install Kali LinuxGo to Storage tab and select Controller: IDE, select Empty, at the right most corner select the tiny CD icon from where you can browse the ISO file that you have downloaded on your PC. Select the image file

Go to Storage tab and select Controller

Now let’s start the virtual machine

Now let’s start the virtual machine

Select the Graphical install option as we need to install GUI based interface

Select the Graphical install option as we need to install GUI based interface

Select the language of your choice

Select the language of your choice

Select your location

Select your location

Set the keyboard configuration based upon your choice

Set the keyboard configuration based upon your choice

Set the hostname of the guest as ‘Kali’, you can choose any name

Set the hostname of the guest as ‘Kali’, you can choose any name

Set the appropriate domain name if you want to configure it, in our case we will leave it as blank

Set the appropriate domain name if you want to configure it, in our case we will leave it as blank

Set the password for your machine

Set the password for your machine

Next the installer will ask you about the partitions of the disk. The easiest option for you is to use ‘Guided – Use Entire Disk’, Set the partitioning disk (leave it default as we will do a configuration by using the entire disk without partitioning)

Guided – Use Entire Disk

Continue the installation

Continue the installation

After that it will ask for a network mirror for configuring package manager but in our case we are not using it therefor select ‘no’

configuring package manager

Set the proxy information if you have any otherwise leave it blank

Set the proxy information if you have any otherwise leave it blank

It will ask now to install the GRUB boot loader, select yes and proceed to continue

It will ask now to install the GRUB boot loader, select yes and proceed to continue

The message shows up when the installation will be completed, press continue

The message shows up when the installation will be completed, press continue

Login as root user and its password

Login as root user and its password

Now explore the variety of security tools (Nmap, Wireshark, Automater, John the ripper, WifiTap etc) and conduct the test by using this GUI Interface

Now explore the variety of security tools

 

Irfan Shakeel
Irfan Shakeel, the founder of ehacking project, he also hosts cyber security training classes at EH Academy. He has discovered many vulnerabilities in the famous platforms (like Google, Dailymotion, Harvard University & etc.). He specializes in Network hacking, VoIP pentesting & digital forensics. He is the author of the book title “Hacking from Scratch”.

Most Popular

The Complete OSINT Tutorial to Find Personal Information About Anyone

This article mainly focuses on how to discover a person's digital footprint and gather personal data by using open-source intelligence (OSINT). So, in its...

How to find the password of hacked email addresses using OSINT

Open-source intelligence or OSINT is a potent technique, and it can give a lot of valuable information, if implemented correctly with the right strategy...

How to Identify Company’s Hacked Email Addresses Using Maltego & HaveIbeenPawned

This article is part of the Maltego OSINT tutorial, where you will learn to identify the already hacked account, and it’s password using the...

5 Key Vulnerabilities in Global Payroll

The cyber threat against payroll is growing in sophistication and frequency, according to the latest FBI cybercrime report. Many of these attacks exploit fixable...