Security Assessment with Kali Linux

  • Petar Čisar Academy of Criminalistic and Police Studies, Belgrade - Zemun
  • Sanja Maravic Cisar Subotica Tech-College of Applied Sciences
  • Igor FÜRSTNER Óbuda University, Donát Bánki Faculty of Mechanical and Safety Engineering
Keywords: information security, assessment, vulnerability, penetration test, ethical hacking, Kali Linux


This paper discusses the assessment of information system security. When referring to the security of an information system, the authors focus on three major features of the system: confidentiality, integrity and availability. Diverse methods are used to identify existing security weaknesses and security assessment, including the Kali Linux operating system. This work offers a wide-ranging overview of possible uses, benefits and drawbacks. The greatest advantage of implementing this operating system is the considerable collection of various tools for vulnerability assessment and penetration testing, mainly intended for ethical hacking. Further, the paper outlines which present forms of vulnerabilities are best identified by Kali.


[1] Hertzog, R., O'Gorman, J., & Aharoni, M. (2017). Kali Linux Revealed, Offsec Press, 283-284.
[2] Allen, L., Heriyanto, T., & Ali, S. (2014). Kali Linux - Assuring Security by Penetration Testing, Packt Publishing, 54-64.
[3] Meucci, M., & Muller, A. (2014). Testing Guide 4.0. OWASP, Web Application Penetration Testing,
[4] Kali Linux Tools Listing,
[5] Quora,
[6] Official Kali Linux Documentation. (2014).,
[7] Offensive Security: Penetration Testing With Kali Linux,
[8] Pritchett, W., & De Smet, D (2013). Kali Linux Cookbook. Packt Publishing.
Critical Infrastructure and Cyber Protection (Kritikus infrastruktúra)