Installing Kali Linux – Simple instructions for beginners [2026]

How can I install Kali Linux?

This guide is designed to help you get started hacking with a professional operating system.

Let’s get started!

What is Linux?

Linux is a free open source operating system from Linus Torvalds, which is part of the GNU project. Many volunteers work on the development of the open source project in contrast to Microsoft’s Windows and Apple’s macOS. Linux is hidden in many devices: Steam Deck, servers, IoT devices and more

Some Linux systems are user-friendly, fast and compatible. The advantage of Linux is that you can customise and modify everything yourself, just as you want your operating system to be. There are significantly more user-friendly settings for customisations. For a fundamental change, you need in-depth programming knowledge to change the kernel.

Is Kali Linux suitable for beginners?

The big advantage of Kali Linux, a distribution/offshoot of Linux, is the time advantage.

Those interested in starting hacking do not have to download, install and prepare all programmes first, but use the distribution as a fully configured hacking environment.

Why is the distribution suitable for hacking?

This distribution is a derivative of Linux (more precisely Debian). Mati Aharoni and Devon Kearn from the company Offensive Security have been developing the derivative since 2012. The developers have equipped the software with the best hacking tools in the open source world.

Why not hack with Windows?

Some hacking programmes do not run on Windows (or only via detours). Windows prevents critical hacking operations (e.g. in the network). Microsoft has built in these barriers to protect “normal users”. Unlike Linux, Microsoft does not provide the source code. Customisations are much more difficult to carry out (decompiling and rewriting).

The distribution is not a system for documents, images or private data because many security options are omitted to make hacking easier.

Hacking – your first steps

Real hacking” does not work according to a “patent recipe”.

When hacking, the hacker tries out different approaches to penetrate a computer. The hacker tries to gain access using various scanning and exploit tools. The hacker gains root access (administrator of the Linux world) to the target computer. If you are studying cybersecurity (computer science), you will learn the following sequence:

  • Reconnaissance: Collecting information about a target object
  • Scanning: Using scanners to examine the target for ports and vulnerabilities
  • Gaining access: Establishing access via a vulnerability or misconfiguration
  • Maintaining Access: Maintaining the hacking connection and executing the malicious commands (stealing data, monitoring or deleting files, etc.)
  • Clearing Track: Eliminate the hacking traces created

Installation directly or as a virtual machine?

Like any Linux, you can install the distribution on your hard drive as an operating system (Bare-metal).

Most users use this operating system as a virtual machine. The installation is faster and offers you no restrictions. With the virtualisation software VMware, you can work on several monitors at the same time and move files back and forth between Windows and Linux via a shared folder.

Go through the virtual machines tutorial.

Which computer do I need for hacking?

You don’t need an expensive computer, laptop, gaming battle station or workstation for the virtual machine.

I recommend that you use at least 8 GB of RAM with a solid-state disc (SSD). If you have less RAM and no SSD, you can also hack. Loading and shutting down the virtual machine will take longer with less system performance.

Tutorial Install Kali Linux via VMware

#0 Quick installation with ova file

Download the ova file from the system (2 GB) and import it. Depending on computer performance and bandwidth, this process may take longer than the manual setup I describe below. The ova file contains a fully configured Linux. You only need to know the password (should be included with the download).

Alternatively:

Download the ISO file

#1 Prepare VMware

  1. Visit the website
    https://www.vmware.com/de/products/workstation-player.html
    and download the VMware Workstation Player (NOT PRO).
    00 VMware Homepage - Virtuelle Maschine erstellen Coding Steffen Lippke
  2. Download the latest version of VMware Workstation Player for Windows 64-bit Operating Systems
    01 64 Bit - Virtuelle Maschine erstellen Coding Steffen Lippke
  3. Execute .exe
    03 Einfach Next - - Virtuelle Maschine erstellen Coding Steffen Lippke
  4. Click Next at the bottom
  5. Do not use the improved keyboard driver from VMWare in the first step
    04 Verbesserete Tastatur - Virtuelle Maschine erstellen Coding Steffen Lippke
  6. Install the ISO
  7. Confirm with Continue that you are not using the software commercially
    05 Nicht kommerziell - Virtuelle Maschine erstellen Coding Steffen Lippke
  8. The setup is ready for the operating system installation

#2 Load ISO in VMWare

Many Linux operating systems are free.

Download the latest version of the distribution in 64 bit as an .iso file. File. The geek normally burns an .iso file onto a CD or USB stick so that you can switch to a different installation medium when booting the computer. This is not necessary in this case.

06 Installation beendet - Virtuelle Maschine erstellen Coding Steffen Lippke
06 Installation completed – Creating a virtual machine Coding Steffen Lippke

The other Linux systems are set up in the same way.

I will show you the installation of Linux Mint with VMware. All Ubuntu / Debian operating systems with a graphical user interface have a similar installation behaviour.

#3 Create a virtual machine in VMware

  1. Create a new machine / alternatively load the ova fileOpen a Virtual Machine” to skip the configuration.
  2. Select ISO
  3. Search for the ISO file in your file system
  4. Next
  5. Select Linux
  6. Select Other Linux 3.x Kernel 64-Bit
    09 Systemart - Virtuelle Maschine erstellen Coding Steffen Lippke
  7. Select a name
    Select the size of the hard drive. My recommendation is at least 80 GB, although only 10 GB would be necessary. As soon as you have installed 4–5 programmes, the 10 GB will overflow and a later expansion will be more complicated.

Configuration tips:

  • Use a 1-FACHE file. This trick increases the speed of the virtual machine.
  • Set the RAM consumption to at least 3 GB, preferably 10 GB and allow 4 CPU cores
  • Close all programmes besides VMware and this tab with the tutorial to save RAM.

#5 Unlock virtualisation

Add the virtualisation-based security functions via Programs and Features.

To do this, open the “Programs and Features” control panel. Select Switch Windows function on or off. Go to Hyper-V > Hyper-V Platform and tick the Hyper-V Hypervisor checkbox.

Activate the Isolated User Mode checkbox at the top level of the feature selection

Select OK.

#6 Start operating system

  1. Open VMware
  2. Start the VM
  3. Click on the starting boot screen to switch to the guest operating system
  4. Press any key to initiate the boot process
  5. Wait until the VM has booted (10s – 10 min depending on the computing power)
  6. Start the installation of the operating system. The installation is similar to a real installation on a real hard drive. Follow the instructions and enter the username and password.
  7. Finished

What can I do with the software?

If you open the start menu at the top right, you will see the 12 folders with the Linux hacking tools.

The hacking tools are grouped according to how they work.

Not all programmes have a user interface. If you click on the shortcut, a terminal window opens which executes the programme. You can query the commands for the programme with the -help flag or the man command.

If you are not yet familiar with the Linux console, I recommend you have a look at my tutorial on the Linux terminal.

Many hacking tools do not have an interface!

Good programmes included

The following tools are interesting for beginners:

  • Metasploit: The console application helps you to execute various exploits. Set your parameters (e.g. the IP address of the target) and execute the exploit!
  • Burp Suite: The online hacking multi-tool is suitable for putting websites through their paces and penetrating them with SQL injections.
  • fCrackZip: The application attempts to crack encrypted ZIP files using password lists (with brute force).

Dieser Beitrag ist zitierfähig. Adaptiere das Beispiel nach dem Harvard Stil: Lippke, Steffen (2026): ‘Programmieren lernen – Tutorial für Einsteiger’, Security and Coding Explosive Tutorials [online], 01. Januar 2026. Verfügbar unter: https://lippke.li/programmieren-lernen/, ISSN: 3054-3436

Leave a Reply

Your email address will not be published. Required fields are marked *