{"id":238,"date":"2023-01-16T15:52:01","date_gmt":"2023-01-16T15:52:01","guid":{"rendered":"https:\/\/wordpress-660014-2156598.cloudwaysapps.com\/?p=238"},"modified":"2023-02-08T11:24:55","modified_gmt":"2023-02-08T11:24:55","slug":"5-best-linux-distros-for-ethical-hacking-and-penetration-testing","status":"publish","type":"post","link":"https:\/\/matob.web.id\/news\/5-best-linux-distros-for-ethical-hacking-and-penetration-testing\/","title":{"rendered":"5 Best Linux Distros for Ethical Hacking and Penetration Testing"},"content":{"rendered":"<p>In this article I will share about linux distros that are suitable for hacking and penetration test. Pentest distributions are generally equipped with tools that are intended for this activity.<\/p>\n<p>Linux has long been known as an operating system that is useful as a hacking tool.\u00a0Therefore, developers are trying to develop a special Linux that is useful for hacking and forensics.\u00a0When you use the distro, you just have to use it because there are complete hacking and forensic tools available.<\/p>\n<p>This article will list some Linux distributions that are specifically aimed at ethical hacking. When you hear the term hacker (hacker), you may think of a cyber criminal (sybercrime) whose job is to steal confidential data by penetrating the security of computer systems or networks. Such malicious hackers are also known as black hat hackers.<\/p>\n<p>And here is a list of the <a href=\"https:\/\/matob.web.id\/news\/5-best-linux-distros-for-ethical-hacking-and-penetration-testing\/\">best Linux distro for hacking<\/a>.<\/p>\n<h2>Kali Linux<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-1227\" src=\"https:\/\/matob.web.id\/news\/wp-content\/uploads\/sites\/4\/2020\/11\/release-2020.2-kali-kde-dark-1024x576.png\" alt=\"kali linux\" width=\"1024\" height=\"576\" title=\"\" srcset=\"https:\/\/matob.web.id\/news\/wp-content\/uploads\/sites\/4\/2020\/11\/release-2020.2-kali-kde-dark-1024x576.png 1024w, https:\/\/matob.web.id\/news\/wp-content\/uploads\/sites\/4\/2020\/11\/release-2020.2-kali-kde-dark-300x169.png 300w, https:\/\/matob.web.id\/news\/wp-content\/uploads\/sites\/4\/2020\/11\/release-2020.2-kali-kde-dark-768x432.png 768w, https:\/\/matob.web.id\/news\/wp-content\/uploads\/sites\/4\/2020\/11\/release-2020.2-kali-kde-dark-1536x864.png 1536w, https:\/\/matob.web.id\/news\/wp-content\/uploads\/sites\/4\/2020\/11\/release-2020.2-kali-kde-dark.png 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>The hacking distro, which became the successor to BackTrack, has become a very popular distribution especially since Elliot from the TV series Mr. Robot used this OS to do the hack.<\/p>\n<p>Kali Linux is a Debian Linux based operating system developed by Offensive Security.\u00a0In terms of appearance, Kali Linux has a simple and not too flashy appearance and its use is quite easy, so it is very good for beginners in penetrating the network.\u00a0Apart from being available on PCs, Kali Linux also makes a ROM available on Android called Kali Nethunter which has the same function.<\/p>\n<p>Kali Linux is the reincarnation of BackTrack, a Linux distribution that was created specifically to meet the needs of penetration and testing on a system and security on computers.\u00a0The existence of Kali Linux is expected to be more stable and powerful than the previous generation, BackTrack.\u00a0Fully compliant with development standards on Debian.\u00a0The most recent release now is Kali Linux 1.0.7 which was released in May 2014.<\/p>\n<p>Website: <a href=\"https:\/\/www.kali.org\/\" target=\"_blank\" rel=\"noopener\">https:\/\/kali.org<\/a><\/p>\n<h2>BackBox<\/h2>\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/linux.backbox.org\/wp-content\/uploads\/sites\/3\/2018\/09\/bb5-desktop.png\" alt=\"\" title=\"\"><\/p>\n<p>BackBox is a Linux distro based on Ubuntu LTS for penetration testing and security assessment purposes. This Linux distribution offers stability, speed and ease of use. This Linux distro is quite famous and a favorite among the hacker community. BackBox has its own software repository that provides the latest stable versions of its built-in hacking tools.<\/p>\n<p>BackBox is designed with minimalism in mind and uses the XFCE desktop environment. The design idea is to minimize resource consumption and maximize performance. The tools in the BackBox are very well organized, avoiding redundant and similar functional tools. BackBox is one of the best Linux distributions for ethical hacking.<\/p>\n<p>Website: <a href=\"https:\/\/backbox.org\" target=\"_blank\" rel=\"noopener\">https:\/\/backbox.org<\/a><\/p>\n<h2>BlackArch<\/h2>\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/blackarch.org\/images\/screenshots\/lxdm.png\" alt=\"BlackArch Linux with lxdm\" title=\"\"><\/p>\n<p>BlackArch is a hacking distro derived from Arch Linux which is well known for its stability. The BlackArch repository itself provides around 2406 ready-to-use hacking tools.<\/p>\n<p>BlackArch is an Arch Linux derivative distribution for\u00a0<em>security researchers<\/em>\u00a0and\u00a0<em>ethical hackers<\/em>\u00a0.\u00a0To support it, the BlackArch repository provides more than 1400 hacking tools that have been tested before.<\/p>\n<p>There are two versions of BlackArch if the reader wants to download it.\u00a0There is a Live version with a size of 7.5GB or you can use the Netinstall version which is only 521MB in size.\u00a0The Live version is an\u00a0<em>all in one<\/em>\u00a0version\u00a0(&#8220;almost&#8221; all available) and the Netinstall version is an empty version where we still have to download other applications.\u00a0The difference is for the Live version we have to download it completely before we can install it, but if the Netinstall one we can install the basic system first.\u00a0After the basic system is installed we can use it while downloading the necessary applications.<\/p>\n<p>Website: <a href=\"https:\/\/blackarch.org\/\" target=\"_blank\" rel=\"noopener\">https:\/\/blackarch.org\/<\/a><\/p>\n<h2>Parrot<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-239\" src=\"https:\/\/matob.web.id\/news\/wp-content\/uploads\/sites\/4\/2020\/11\/5-Best-Linux-Distros-for-Ethical-Hacking.png\" alt=\"5 Best Linux Distros for Ethical Hacking\" width=\"960\" height=\"540\" title=\"\" srcset=\"https:\/\/matob.web.id\/news\/wp-content\/uploads\/sites\/4\/2020\/11\/5-Best-Linux-Distros-for-Ethical-Hacking.png 960w, https:\/\/matob.web.id\/news\/wp-content\/uploads\/sites\/4\/2020\/11\/5-Best-Linux-Distros-for-Ethical-Hacking-300x169.png 300w, https:\/\/matob.web.id\/news\/wp-content\/uploads\/sites\/4\/2020\/11\/5-Best-Linux-Distros-for-Ethical-Hacking-768x432.png 768w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/><\/p>\n<p>Parrot OS is always compared to Kali Linux because they are both derivatives of Debian. Its appearance is often referred to as an alternative to Kali Linux because in terms of resources, Parrot requires lower specifications. The distro is also quite popular so don&#8217;t worry about community support issues.<\/p>\n<p>Parrot Security OS is a Debian-derived distro that aims to provide a complete security application and an encrypted, secure and ready-to-use system to connect to the network secretly.<\/p>\n<p>The desktop environment used by Parrot Security OS is MATE, DE which is also used by Linux Mint.\u00a0Applications that are generally available in special security distributions are also available, plus a special application made by Frozenbox Network, the developer of Parrot Security OS.<\/p>\n<p>Parrot Security OS is a lightweight and efficient Linux distro, running on a minimum of 256MB RAM for 32-bit and 512MB for 64-bit.\u00a0Parrot Security OS uses MATE for its desktop environment and GNOME 2 interface. What&#8217;s interesting about this distro is that it has an anonymous mode that automatically reroutes traffic through the TOR server network.\u00a0Even better, Parrot Security OS has strong community support.<\/p>\n<p>Website: <a href=\"https:\/\/parrotlinux.org\/\" target=\"_blank\" rel=\"noopener\">https:\/\/parrotlinux.org\/<\/a><\/p>\n<h2>Bonus<\/h2>\n<p>Apart from the five distributions above, here are the pentest distributions from Indonesia whose development is still active and continuing. If you are curious, you can try it.<\/p>\n<ul>\n<li>DracOs<\/li>\n<li>IbisLinux<\/li>\n<li>Codernate<\/li>\n<\/ul>\n<p>Okay maybe that&#8217;s the article this time, if you have anything to ask, please leave a comment.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this article I will share about linux distros that are suitable for hacking and penetration test. Pentest distributions are generally equipped with tools that are intended for this activity. Linux has long been known as an operating system that is useful as a hacking tool.\u00a0Therefore, developers are trying to develop a special Linux that [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":239,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[73,92,120,177],"class_list":["post-238","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-software","tag-ethical-hacking","tag-hacking","tag-linux","tag-security"],"_links":{"self":[{"href":"https:\/\/matob.web.id\/news\/wp-json\/wp\/v2\/posts\/238","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/matob.web.id\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/matob.web.id\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/matob.web.id\/news\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/matob.web.id\/news\/wp-json\/wp\/v2\/comments?post=238"}],"version-history":[{"count":1,"href":"https:\/\/matob.web.id\/news\/wp-json\/wp\/v2\/posts\/238\/revisions"}],"predecessor-version":[{"id":1834,"href":"https:\/\/matob.web.id\/news\/wp-json\/wp\/v2\/posts\/238\/revisions\/1834"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/matob.web.id\/news\/wp-json\/wp\/v2\/media\/239"}],"wp:attachment":[{"href":"https:\/\/matob.web.id\/news\/wp-json\/wp\/v2\/media?parent=238"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/matob.web.id\/news\/wp-json\/wp\/v2\/categories?post=238"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/matob.web.id\/news\/wp-json\/wp\/v2\/tags?post=238"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}