VM Instance

Kali Linux - Virtual Desktop

Kali Linux (formerly known as BackTrack Linux) is an open-source, Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. Kali Linux contains several hundred tools targeted toward various information security tasks, such as Penetration Testing, Security Research, Computer Forensics, and Reverse Engineering. Kali Linux is a multi-platform solution, accessible and freely available to information security professionals and hobbyists.

 

Cybersecurity experts use Kali Linux for security testing more than any other Linux distributions on the market. Kali is compatible with all programs in the Debian package repository. Its GNU General Public License (GPL) allows developers to access the source code and modify their distro as needed. 

The Operating System (OS) works across many devices, including those with minimal processor power in the cloud, through containers, virtual machines, mobile phone, and USB. Multiple desktop environments improve customizability on user workstations. Kali Linux provides multilingual support for international enterprises.  We created this VM workload to allow for teams to focus on their project and not how to deploy the project to production.

 

Features

  • More than 600 penetration testing tools included: After reviewing every tool that was included in BackTrack, we eliminated a great number of tools that either simply did not work or which duplicated other tools that provided the same or similar functionality. Details on what’s included are on the Kali Tools site.

  • FHS compliant: Kali adheres to the Filesystem Hierarchy Standard, allowing Linux users to easily locate binaries, support files, libraries, etc.

  • Wide-ranging wireless device support: A regular sticking point with Linux distributions has been support for wireless interfaces. We have built Kali Linux to support as many wireless devices as we possibly can, allowing it to run properly on a wide variety of hardware and making it compatible with numerous USB and other wireless devices.

  • Custom kernel, patched for injection: As penetration testers, the development team often needs to do wireless assessments, so our kernel has the latest injection patches included.

  • Access via RDP

Get it on Azure

Kali Linux provides a robust set of tools and utilities to test security on computers and networks. “Forensics mode” is deployable from USB drives to check data integrity with hashing. The Autopsy tool consolidates numerous digital forensics toolkits into a single User Interface (UI). The Tor browser ensures anonymity by blocking trackers and ads, and automatically clearing your cookies and cache. It uses multi-layered encryption, hides browsing, and prevents digital fingerprinting. It also features the Nmap port scanner, John the Ripper password cracker, Metasploit pentesting framework, and Wireshark packet analyzer. The dpkg package manger controls installation, removal, and updating all software on the OS. 

Virtualization is supported by VMware, VirtualBox, and Vagrant, while containerization is supported by Docker and LXC / LXD images. Cloud infrastructure users choose from Amazon Web Services (AWS), Digital Ocean, and Linode. Users also choose from various desktop softwares to change the UI, including Xfce (default) for lightweight performance, GNOME for simplicity, and KDE Plasma. The default Unix shell is ZSH, and Bash is an alternative option. 

Multiple 32-bit and 64-bit processor architectures are supported by Kali Linux, including i686, x86, x86_64, and ARM. Kali Linux utilizes a monolithic Linux kernel. 

Ntegral certified images are always up-to-date, secure, and built to work right out of the box. 

Ntegral packages applications following industry standards, and continuously monitors all components and libraries for vulnerabilities and application updates. When any security threat or update is identified, Ntegral automatically repackages the applications and pushes the latest versions to the cloud marketplaces.