{"id":191586,"date":"2026-02-18T10:33:14","date_gmt":"2026-02-18T09:33:14","guid":{"rendered":"https:\/\/liora.io\/en\/?p=191586"},"modified":"2026-02-18T10:33:15","modified_gmt":"2026-02-18T09:33:15","slug":"all-about-kali-linux","status":"publish","type":"post","link":"https:\/\/liora.io\/en\/all-about-kali-linux","title":{"rendered":"What is Kali Linux?"},"content":{"rendered":"<p><strong><b>Kali Linux is a Linux distribution specifically crafted for security testing and vulnerability analysis. Equipped with over 600 tools dedicated to penetration testing, it has become a benchmark in cybersecurity! Dive into its history, the capabilities it offers, its use cases, and how to utilize it!<\/b><\/strong><\/p>\n<!-- \/wp:post-content -->\n\n<!-- wp:paragraph -->\n<p>Due to the surge of computer threats, <b>system and network security<\/b> has emerged as a top priority for businesses and individuals alike. Cyberattacks are on the rise, becoming increasingly sophisticated. Daily, they put at risk <b>sensitive data<\/b> and the <b>integrity of digital infrastructures<\/b>. It is therefore crucial to identify potential vulnerabilities before they are exploited. Hence the importance of <b>penetration testing, or &#8220;pentests&#8221;<\/b>, which simulate real attacks on a system.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>The objective? To evaluate robustness and prevent vulnerabilities. However, specialized tools are essential to successfully conduct these tests. Among the leading solutions in this field is a comprehensive suite of tools dedicated to <strong>IT security and ethical hacking<\/strong>: Kali Linux.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:image {\"sizeSlug\":\"large\"} -->\n\n<!-- \/wp:image -->\n\n<!-- wp:heading {\"level\":3} -->\n<h2 id=\"h-the-history-of-kali-linux-the-evolution-of-backtrack\" class=\"wp-block-heading\">The history of Kali Linux: The evolution of BackTrack<\/h2>\n<!-- \/wp:heading -->\n\n<!-- wp:paragraph -->\n<p>The roots of Kali Linux trace back to a prior project known as <b>BackTrack<\/b>. Launched in 2006, this distribution was created as a collection of tools to facilitate penetration testing, emphasizing <b>ease of use<\/b>. In 2013, <b>Offensive Security<\/b> sought to redefine and modernize the concept with the introduction of Kali Linux.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>This new version introduced a stable <b>Debian base<\/b>, enabling more precise package and update management along with enhanced overall security. Over the years, numerous advancements have allowed Kali Linux to remain <a href=\"https:\/\/liora.io\/en\/all-about-ai-and-cybersecurity\">at the forefront of cybersecurity demands<\/a>. Besides enhancements, it has adapted to new environments.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Currently, it can be utilized across a multitude of devices, from conventional computers to Raspberry Pi and even smartphones with <b>Kali NetHunter<\/b>. It is this very adaptability that has allowed it to diversify and establish itself as an <b>indispensable tool<\/b> in the computing domain.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:buttons {\"layout\":{\"type\":\"flex\",\"justifyContent\":\"center\"}} -->\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex is-content-justification-center\"><!-- wp:button -->\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/liora.io\/en\/courses\/\">Discover our courses<\/a><\/div>\n<!-- \/wp:button --><\/div>\n<!-- \/wp:buttons -->\n\n<!-- wp:heading {\"level\":3} -->\n<h2 id=\"h-a-vast-collection-of-600-ethical-hacking-software\" class=\"wp-block-heading\">A vast collection of 600 ethical hacking software<\/h2><!-- wp:image {\"id\":207149,\"sizeSlug\":\"large\"} --><figure class=\"wp-block-image size-large\" style=\"margin-top:var(--wp--preset--spacing--columns);margin-bottom:var(--wp--preset--spacing--columns)\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"572\" src=\"https:\/\/liora.io\/app\/uploads\/sites\/9\/2026\/02\/woman-working-on-computer-documents-1024x572.jpg\" alt=\"woman_working_on_computer_documents.jpg\" class=\"wp-image-207149\" srcset=\"https:\/\/liora.io\/app\/uploads\/sites\/9\/2026\/02\/woman-working-on-computer-documents-1024x572.jpg 1024w, https:\/\/liora.io\/app\/uploads\/sites\/9\/2026\/02\/woman-working-on-computer-documents-300x167.jpg 300w, https:\/\/liora.io\/app\/uploads\/sites\/9\/2026\/02\/woman-working-on-computer-documents-768x429.jpg 768w, https:\/\/liora.io\/app\/uploads\/sites\/9\/2026\/02\/woman-working-on-computer-documents-1536x857.jpg 1536w, https:\/\/liora.io\/app\/uploads\/sites\/9\/2026\/02\/woman-working-on-computer-documents-2048x1143.jpg 2048w, https:\/\/liora.io\/app\/uploads\/sites\/9\/2026\/02\/woman-working-on-computer-documents-440x246.jpg 440w, https:\/\/liora.io\/app\/uploads\/sites\/9\/2026\/02\/woman-working-on-computer-documents-785x438.jpg 785w, https:\/\/liora.io\/app\/uploads\/sites\/9\/2026\/02\/woman-working-on-computer-documents-210x117.jpg 210w, https:\/\/liora.io\/app\/uploads\/sites\/9\/2026\/02\/woman-working-on-computer-documents-115x64.jpg 115w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><!-- \/wp:image -->\n<!-- \/wp:heading -->\n\n<!-- wp:paragraph -->\n<p>If there is one thing that distinguishes Kali Linux, it&#8217;s the extensive array of tools dedicated to <b>IT security and ethical hacking<\/b>. With more than 600 pre-installed software tools, this distribution provides a comprehensive arsenal to <b>address a wide array of security testing requirements<\/b>.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>These tools are categorized into various groups: network analysis, penetration testing, vulnerability detection, password cracking\u2026<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Each tool is optimized to generate precise results, whether it&#8217;s to <b>simulate an attack<\/b> or to <b>secure a network<\/b>. Additionally, Kali Linux is renowned for its compatibility with numerous devices. It can be installed on <a href=\"https:\/\/liora.io\/en\/virtual-machine-definition-use-and-benefits\">a virtual machine<\/a>, booted from a <b>USB stick<\/b>, or even deployed on a <b>Raspberry Pi<\/b>.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Furthermore, it offers versions tailored to different contexts, such as Kali NetHunter for <b>Android devices<\/b>. This facilitates expanded testing possibilities on the move! This flexibility allows Kali to meet the diverse needs of users, be they professionals or enthusiasts.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:image {\"sizeSlug\":\"large\"} -->\n\n<!-- \/wp:image -->\n\n<!-- wp:heading {\"level\":3} -->\n<h2 id=\"h-a-pentest-with-kali-linux-how-does-it-work\" class=\"wp-block-heading\">A PenTest with Kali Linux, how does it work?<\/h2>\n<!-- \/wp:heading -->\n\n<!-- wp:paragraph -->\n<p>Penetration testing is one of the primary use cases for Kali Linux. These tests strive to <b>assess a system&#8217;s security<\/b> by simulating authentic cyberattacks. By offering a complete toolkit for such tasks, Kali Linux enables users to <b>identify vulnerabilities<\/b> in computer systems and networks.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Among the most commonly used tools, <b>Nmap<\/b> is employed to map a network and identify active hosts and their services. Meanwhile, <b>Metasploit<\/b> functions as a vulnerability exploitation platform used to assess identified vulnerabilities within systems.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p><b>Wireshark<\/b> is also utilized to analyze network packets and detect potential anomalies in data flows. Don&#8217;t overlook <b>John the Ripper<\/b>: a potent password decryption tool, also included to test password robustness on targeted systems.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Besides professionals, <b>enthusiasts and students in cybersecurity<\/b> can utilize Kali as an educational platform to conduct security tests. Nevertheless, <b>its use must remain ethical!<\/b> Any attempt to breach systems without authorization is illegal and can lead to severe consequences. Tests should always be conducted in environments where explicit permissions have been granted, to adhere to prevailing legislation.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:buttons {\"layout\":{\"type\":\"flex\",\"justifyContent\":\"center\"}} -->\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex is-content-justification-center\"><!-- wp:button -->\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/liora.io\/en\/courses\/\">Learn all about Linux<\/a><\/div>\n<!-- \/wp:button --><\/div>\n<!-- \/wp:buttons -->\n\n<!-- wp:heading {\"level\":3} -->\n<h3 id=\"h-offensive-security-certified-professional-a-highly-recognized-certification\" class=\"wp-block-heading\">Offensive Security Certified Professional: A highly recognized certification<\/h3>\n<!-- \/wp:heading -->\n\n<!-- wp:paragraph -->\n<p>The team behind Kali Linux, Offensive Security, offers professional certifications. A highly sought-after certification is the <b>OSCP: Offensive Security Certified Professional<\/b>. This program is an intensive training in penetration testing, and <b>the certification is widely respected in the cybersecurity industry<\/b>. It is a significant asset for professionals aspiring to validate their skills in offensive security.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Moreover, a vast community of enthusiasts and professionals actively contributes to the development and enhancement of Kali Linux. This community aids the distribution&#8217;s evolution by offering tools, updates, and tutorials for users.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>In dedicated forums, numerous technical discussions, tips, and troubleshooting help newcomers get started. Online, <b>innumerable resources<\/b> such as blogs, videos, and online courses are accessible to deepen one\u2019s understanding of security testing.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>The official documentation is regularly updated to guide users through the installation, configuration, and utilization of different tools. Nevertheless, the optimal way to expertise in Kali Linux is to consider training like what Liora offers!<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:image {\"sizeSlug\":\"large\"} -->\n\n<!-- \/wp:image -->\n\n<!-- wp:heading {\"level\":3} -->\n<h2 id=\"h-the-main-innovations-of-recent-versions\" class=\"wp-block-heading\">The main innovations of recent versions<\/h2><!-- wp:image {\"id\":207150,\"sizeSlug\":\"large\"} --><figure class=\"wp-block-image size-large\" style=\"margin-top:var(--wp--preset--spacing--columns);margin-bottom:var(--wp--preset--spacing--columns)\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"572\" src=\"https:\/\/liora.io\/app\/uploads\/sites\/9\/2026\/02\/computer-screen-command-line-interface-1024x572.jpg\" alt=\"computer-screen-command-line-interface.jpg\" class=\"wp-image-207150\" srcset=\"https:\/\/liora.io\/app\/uploads\/sites\/9\/2026\/02\/computer-screen-command-line-interface-1024x572.jpg 1024w, https:\/\/liora.io\/app\/uploads\/sites\/9\/2026\/02\/computer-screen-command-line-interface-300x167.jpg 300w, https:\/\/liora.io\/app\/uploads\/sites\/9\/2026\/02\/computer-screen-command-line-interface-768x429.jpg 768w, https:\/\/liora.io\/app\/uploads\/sites\/9\/2026\/02\/computer-screen-command-line-interface-1536x857.jpg 1536w, https:\/\/liora.io\/app\/uploads\/sites\/9\/2026\/02\/computer-screen-command-line-interface-2048x1143.jpg 2048w, https:\/\/liora.io\/app\/uploads\/sites\/9\/2026\/02\/computer-screen-command-line-interface-440x246.jpg 440w, https:\/\/liora.io\/app\/uploads\/sites\/9\/2026\/02\/computer-screen-command-line-interface-785x438.jpg 785w, https:\/\/liora.io\/app\/uploads\/sites\/9\/2026\/02\/computer-screen-command-line-interface-210x117.jpg 210w, https:\/\/liora.io\/app\/uploads\/sites\/9\/2026\/02\/computer-screen-command-line-interface-115x64.jpg 115w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><!-- \/wp:image -->\n<!-- \/wp:heading -->\n\n<!-- wp:paragraph -->\n<p>Kali Linux has significantly evolved over the years. Here&#8217;s an overview of the pivotal innovations introduced in recent versions. The latest release, <b>2024.3<\/b> as of August 2024, highlights updates to Kali NetHunter: the security testing tool for mobile devices.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Support has been expanded to include new devices, notably models with Qualcomm Snapdragon processors. Version <b>2024.2<\/b>, released in June 2024, unveiled <b>18 new tools<\/b> to enhance network security and penetration testing.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Among them are <b>the multithreaded network reconnaissance tool autorecon<\/b>, coercer, which compels a Windows server to authenticate on an arbitrary machine, and <b>sploitscan<\/b> for searching exploits based on known vulnerabilities.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Improvements to the <b>GNOME 46 desktop environment<\/b> and optimized <b>HiDPI mode<\/b> were also introduced for an enhanced visual experience. Previously, versions <b>2023.1<\/b> and <b>2023.2<\/b> saw the arrival of tools like <b>Wharfee<\/b> to facilitate <a href=\"https:\/\/liora.io\/en\/docker-course-learning-to-use-the-container-platform\">Docker<\/a> container management or <b>VirtualBox Guest Additions<\/b>, which aid the use of Kali Linux in virtual machines.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Each new version brings enhancements that improve user experience while adapting to emerging <b>cybersecurity challenges<\/b>.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:buttons {\"layout\":{\"type\":\"flex\",\"justifyContent\":\"center\"}} -->\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex is-content-justification-center\"><!-- wp:button -->\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/liora.io\/en\/courses\/data-ai\/data-engineer\">Learn to use Docker<\/a><\/div>\n<!-- \/wp:button --><\/div>\n<!-- \/wp:buttons -->\n\n<!-- wp:heading {\"level\":3} -->\n<h2 id=\"h-how-to-install-kali-linux\" class=\"wp-block-heading\">How to install Kali Linux?<\/h2>\n<!-- \/wp:heading -->\n\n<!-- wp:paragraph -->\n<p>Several installation methods are available for Kali Linux, suited for diverse environments and user needs. If you&#8217;re interested in trying it without hard drive installation, the <b>live USB version<\/b> is perfect.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>It allows you to <b>boot Kali directly from a USB stick<\/b>, without affecting existing files or operating systems in place. For more long-term usage, it can be installed as the primary operating system.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>This enables smooth usage and optimal resource management. A common alternative is to <b>install Kali on a virtual machine<\/b>, to test tools or configurations without posing risks to the host system. This approach is particularly valued by beginners or developers seeking to test secure environments.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Once installed, the initial step is basic configuration. It is critical to <b>regularly update packages via official repositories<\/b> to ensure all tools are current. It is also highly recommended to configure specific environments based on individual needs, such as networking or forensic analysis tools. Moreover, different versions cater to particular use cases, like Kali NetHunter for mobile devices or <b>Kali Cloud<\/b> for cloud environments.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:image {\"sizeSlug\":\"large\"} -->\n\n<!-- \/wp:image -->\n\n<!-- wp:heading {\"level\":3} -->\n<h2 id=\"h-kali-linux-an-essential-solution-for-ethical-hackers\" class=\"wp-block-heading\">Kali Linux, an essential solution for ethical hackers<\/h2><!-- wp:image {\"id\":207151,\"sizeSlug\":\"large\"} --><figure class=\"wp-block-image size-large\" style=\"margin-top:var(--wp--preset--spacing--columns);margin-bottom:var(--wp--preset--spacing--columns)\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"572\" src=\"https:\/\/liora.io\/app\/uploads\/sites\/9\/2026\/02\/linux-system-update-1024x572.jpg\" alt=\"linux-system-update.jpg\" class=\"wp-image-207151\" srcset=\"https:\/\/liora.io\/app\/uploads\/sites\/9\/2026\/02\/linux-system-update-1024x572.jpg 1024w, https:\/\/liora.io\/app\/uploads\/sites\/9\/2026\/02\/linux-system-update-300x167.jpg 300w, https:\/\/liora.io\/app\/uploads\/sites\/9\/2026\/02\/linux-system-update-768x429.jpg 768w, https:\/\/liora.io\/app\/uploads\/sites\/9\/2026\/02\/linux-system-update-1536x857.jpg 1536w, https:\/\/liora.io\/app\/uploads\/sites\/9\/2026\/02\/linux-system-update-2048x1143.jpg 2048w, https:\/\/liora.io\/app\/uploads\/sites\/9\/2026\/02\/linux-system-update-440x246.jpg 440w, https:\/\/liora.io\/app\/uploads\/sites\/9\/2026\/02\/linux-system-update-785x438.jpg 785w, https:\/\/liora.io\/app\/uploads\/sites\/9\/2026\/02\/linux-system-update-210x117.jpg 210w, https:\/\/liora.io\/app\/uploads\/sites\/9\/2026\/02\/linux-system-update-115x64.jpg 115w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><!-- \/wp:image -->\n<!-- \/wp:heading -->\n\n<!-- wp:paragraph -->\n<p>With its multitude of specialized tools, versatility, and various installation methods, Kali Linux has solidified its standing as the go-to platform for <b>cybersecurity professionals<\/b> and enthusiasts. However, using it requires prior knowledge of the <b>Linux<\/b> environment. Someone lacking experience with <b>command lines<\/b> or <b>network management<\/b> may struggle to master it independently.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>To learn how to utilize Kali Linux tools, consider choosing <b>Liora<\/b>. Our cybersecurity courses provide all the necessary skills to <b>become an analyst, administrator, consultant, or engineer<\/b> in this thriving domain.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p><a href=\"\/en\/courses\/data-ai\/\">Our diverse training programs<\/a> include, among other things, a <b>module dedicated to ethical hacking<\/b>, featuring a comprehensive section entirely focused on penetration testing. Upon course completion, you will receive a <b>state-recognized diploma<\/b> and be thoroughly prepared to safeguard companies&#8217; IT systems and networks!<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>All our training programs can be pursued in BootCamp, alternating formats, or continuous learning and are eligible for funding via CPF or France Travail. <b>Discover Liora!<\/b><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:buttons {\"style\":{\"spacing\":{\"margin\":{\"top\":\"var:preset|spacing|columns\",\"bottom\":\"var:preset|spacing|columns\"}}},\"layout\":{\"type\":\"flex\",\"justifyContent\":\"center\"}} -->\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex is-content-justification-center\" style=\"margin-top:var(--wp--preset--spacing--columns);margin-bottom:var(--wp--preset--spacing--columns)\"><!-- wp:button -->\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/liora.io\/en\/courses\/\">Discover Liora<\/a><\/div>\n<!-- \/wp:button --><\/div>\n<!-- \/wp:buttons -->\n\n<!-- wp:paragraph -->\n<p>You now know everything about Kali Linux. For more details on similar topics, explore <a href=\"https:\/\/liora.io\/en\/all-about-pentest\">our complete article on Pentests<\/a> and <a href=\"https:\/\/liora.io\/en\/all-about-certified-ethical-hackers\">our article on CEH certification<\/a>!<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:html -->\n<script type=\"application\/ld+json\">\n{\n  \"@context\": \"https:\/\/schema.org\",\n  \"@type\": \"FAQPage\",\n  \"mainEntity\": [\n    {\n      \"@type\": \"Question\",\n      \"name\": \"What is Kali Linux?\",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"Kali Linux is a Linux distribution designed for security testing and vulnerability analysis. It includes over 600 tools dedicated to penetration testing and ethical hacking.\"\n      }\n    },\n    {\n      \"@type\": \"Question\",\n      \"name\": \"What is the history of Kali Linux?\",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"Kali Linux evolved from BackTrack, a project launched in 2006. It was redefined and modernized by Offensive Security in 2013, offering a stable Debian base and improved security features.\"\n      }\n    },\n    {\n      \"@type\": \"Question\",\n      \"name\": \"What tools are available in Kali Linux?\",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"Kali Linux provides over 600 pre-installed tools for tasks like network analysis, penetration testing, vulnerability detection, and password cracking.\"\n      }\n    },\n    {\n      \"@type\": \"Question\",\n      \"name\": \"How is Kali Linux used for penetration testing?\",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"Kali Linux is widely used for penetration testing to simulate cyberattacks, identify vulnerabilities, and improve network security. It includes tools like Nmap, Metasploit, Wireshark, and John the Ripper.\"\n      }\n    },\n    {\n      \"@type\": \"Question\",\n      \"name\": \"What is the OSCP certification?\",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"The Offensive Security Certified Professional (OSCP) is a certification offered by Offensive Security. It focuses on penetration testing and is highly respected in the cybersecurity industry.\"\n      }\n    }\n  ]\n}\n<\/script>\n\n<!-- \/wp:html -->","protected":false},"excerpt":{"rendered":"<p>Kali Linux is a Linux distribution specifically crafted for security testing and vulnerability analysis. Equipped with over 600 tools dedicated to penetration testing, it has become a benchmark in cybersecurity! Dive into its history, the capabilities it offers, its use cases, and how to utilize it! Due to the surge of computer threats, system and [&hellip;]<\/p>\n","protected":false},"author":74,"featured_media":207152,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"editor_notices":[],"footnotes":""},"categories":[2426],"class_list":["post-191586","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity"],"acf":[],"_links":{"self":[{"href":"https:\/\/liora.io\/en\/wp-json\/wp\/v2\/posts\/191586","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/liora.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/liora.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/liora.io\/en\/wp-json\/wp\/v2\/users\/74"}],"replies":[{"embeddable":true,"href":"https:\/\/liora.io\/en\/wp-json\/wp\/v2\/comments?post=191586"}],"version-history":[{"count":5,"href":"https:\/\/liora.io\/en\/wp-json\/wp\/v2\/posts\/191586\/revisions"}],"predecessor-version":[{"id":207901,"href":"https:\/\/liora.io\/en\/wp-json\/wp\/v2\/posts\/191586\/revisions\/207901"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/liora.io\/en\/wp-json\/wp\/v2\/media\/207152"}],"wp:attachment":[{"href":"https:\/\/liora.io\/en\/wp-json\/wp\/v2\/media?parent=191586"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/liora.io\/en\/wp-json\/wp\/v2\/categories?post=191586"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}