Hello Viewers,

Kali Linux is one of the best operating system to use as a hacker or any security profession. However, it doesn’t come perfectly configured right out of the box. Today in this blog, we will discuss about the, 8 important things to do after installing kali Linux on your computer, Virtual Box and Raspberry pi.

#1 Install Git

Git is an open-source software version control application. It can be used for collaboratively sharing and editing code but is commonly referenced here on Null Byte as the primary tool for copying (or “cloning”) code repositories found on GitHub. Git is a must have tool for penetration testers looking to expand their toolset beyond what’s available in the default Kali repositories.


#2 Configure Bash Aliases

Bash aliases are fantastic for creating customized command line shortcuts. For example, we can reassign the  ls command to automatically use our favorite arguments.


#3  Create a New Low Privileged User

Many applications like the Chromium Browser and the Tor Browser should never be opened or used as a root user. Such applications rely heavily upon low-level permissions to deliver some degree of security. It might be beneficial to some users to create a low privileged user account for such activities.


#4 Install a Terminal Multiplexer

A multiplexer is a tiling terminal emulator that allows us to open several terminal sessions inside one single window. The major benefit to this is being able to see all of our open terminal sessions at once and not layer the windows on top of each other.


#5  Install Your Favorite Hacking Tools

Some versions of Kali are geared toward minimalist hackers who prefer not to have hundreds of hacking tools already install. This means we’ll have to install our favorite tools manually. The types of tools we use vary based on our skill set and areas of expertise, but below are some popular hackings tools.

  • Aircrack-ng: Wireless WEP/WPA cracking utilities.
  • BeEF: Browser exploitation framework via web applications.
  • Burp Suite: Graphical application designed for web application security.
  • Hydra: Login password brute-forcing utility.
  • Nikto: Web server security scanner.
  • Maltego: Open-source forensics and intelligence gathering.
  • Nmap: Port scanner and network mapper.
  • Wireshark: Graphical application for network traffic analysis.


#6  Install the latest Version for Tor

Tor is available in Kali’s repositories, but anonymity software should be acquired directly from the source (torproject.org). Furthermore, Kali’s version of Tor is not reliably maintained or updated. This means we could be missing critical stability and security updates.


#7 Install a Code Editor

Atom is a free, open-source, feature-rich, and highly customizable text editor. Its features include the ability to collaboratively share code in real time, intuitive coding autocompletion, and the ability to install packages which further enhance Atom’s versatility. Other noteworthy text editors include Geany and Gedit.


#8  Change SSH Keys & Default Password

The default password for every Kali Linux installation is the same (toor) which makes it very easy to automate attacks. Also, the default SSH keys can allow an attacker to intercept your communications when you’re controlling something like a Raspberry Pi via SSH.

Also Read – Most Important Cyber Attacks Techniques that often used by Hackers


Join the Conversation


  1. This guide would have been great if instructions to install all of the above mentioned were specified, especially for newer kali users.

Leave a comment

Your email address will not be published. Required fields are marked *