Top 10 things to Do After Installing Kali Linux

Kali Linux is considered to be one of the best hacking distribution of this era, it is developed by Offensive Security to give an advance Linux distribution platform where professionals can perform network security assessments and penetration testing. If you are at beginner level while learning the professional penetration testing and security auditing you will learn there is no better toolkit than Kali Linux.

So after installing and setting up an environment you maybe wondering what would be the first step you should take to be familiar with this operating system and from where you can start to perform security testing? Let’s see what will be the top things you can do after installing the OS:

  1. Set the Time Zone

After logging it from root the first thing you would observe is the time could be wrongly set and this will cause a problem while accessing the websites. You can change it easily by using GUI interface:

Right click at the clock on the top

Set the Time Zone

Select Properties

Select Properties

Set the local time. You can also find numerous attributes to change from default

Set the local time

  1. Enable Boot Sound

One of the issues Kali users face is the lack of sound on a fresh installation. To enable it type the command in the terminal:

# apt-get install alsa-utils -y

Enable Boot Sound

  1. Update and Upgrade

It is recommended to update and upgrade all outdated repositories to fix security measures and improve performance:

# apt-get update && apt upgrade

Update and UpgradeApt- update will update the available packages and versions

Apt upgrade will install new version of the packages you are having

  1. Set New Password for Root

While installing the OS you specified root password but what if you want to change the password after sometime? Here is the command to change root password easily:

# passwd

Set New Password for Root

In this way you can easily change your password by typing only one command.

  1. Add a Low Privileged Account

You have been prompt to root account but running as a root account there may be a possibility that a small bug in an application could erase some system files, so a good practice on any operating system is to run as a non-root user with low privileges. To create a new low privileged user:

# adduser [USERNAME]

Add a Low Privileged Account

Add this user to Sudoers group to run the root commands:

# usermode –aG sudo ehacking

Sudoers group Sudoers group After that write a command for setting up the new user for BASH:

$ chsh –s /bin/bash ehacking

ehacking's login shell Set user ehacking’s login shell to /bin/bash

  1. Install Git

Git is a must have tool for ethical hackers looking to increase their toolset beyond what is already installed in the default Kali repositories. To install Git simply type:

# apt-get install git

Install Git

  1. Get Your Favorite Hacking Tools

There are many hacking and pen-testing tools that are already installed in Kali Linux i.e. (Wireshark, Aircrack-ng, BeEF, Burp Suite, Hydra, Nikto, Maltego, Nmap) but what if you want to install your favorite tool that you are going to use for a specific task for example I need to attack a Wi-Fi network by using Airgeddon because it automates using different tools so it is not necessary for you type commands. I can install Airgeddon in Kali Linux by typing command on terminal:

#cd Desktop

#git clone https://github.com/v1s1t0r1sh3r3/airgeddon.git

Get Your Favorite Hacking Tools

Give permissions to make it executable by typing:

# chmod +x airgeddon.sh

Run the file:


Run the file

  1. Install TOR browser

The Onion Router (TOR) is a free and open-source software for enabling anonymous communication. It is designed to stop people tracking your browsing habits including government agencies and corporations. You can install TOR browser by adding the TOR repository to your APT repository:

#  echo ‘deb https://deb.torproject.org/torproject.org stretch main

deb-src https://deb.torproject.org/torproject.org stretch main’ > /etc/apt/sources.list.d/tor.list

then download the package key and importing it into your APT keyring:

# wget -O- https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc | sudo apt-key add –

Type apt-get update:

Install TOR browser

After updating install TOR:

# apt-get install tor deb.torproject.org-keyringAfter updating install TOR

  1. Install Tilix

Tilix is an open source tiling terminal emulator which uses the VTE GTK+ 3 widget having some amazing features such as Layout terminals in any fashion by splitting them horizontally or vertically and Input could be synchronized between terminals so that the commands typed in one terminal are replicated to the others

Install Tilix

Type tilix at prompt to launch

Type tilix at prompt to launch

  1. Install Code Editor

Atom editor is a very good hackable text editor in Kali Linux. To install Atom type commands:

#apt-get install gconf2 gconf-service gvfs-bin libgconf-2-4 gconf2-common

Install Code Editor

#cd Downloads

#dpkg -i atom-amd64.deb



So these are the tools and commands you can use after installing Kali Linux and getting hands on practice while performing security testing and auditing. One more thing to keep in mind is you should have a good knowledge and grip on Linux commands so that if you stuck at any point while installing Kali Linux tools you should know how to perform troubleshooting.

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

Top Tips To Avoid Getting Scammed In Sports Wagering Sites

If you’re a sports fan, you’ve probably wanted to dabble into the world of sports wagering. Who wouldn’t? Just the idea of being able...

5 Security Apps to Protect your Phone from Hackers

Our phones are much more than just communication devices these days. They save all of our personal, financial, and private information. Losing access to...

Ways to Improve Internet Speed

A slow-speed internet that makes you wait for ages before you can finally access a webpage is surely quite a pain! It tests your...

How to Reduce Risk with Runtime Application Self Protection

Instead of waning, cyber attacks continue to rise as the years pass. Several reasons contribute to this phenomenon, despite developing and deploying more robust...