Remove category
article thumbnail

Kali Linux Penetration Testing Tutorial: Step-By-Step Process

eSecurity Planet

You may use a VPN or install utilities to capture and forward traffic to other subnets, or configure proxychains. Once installed, however, Kali Linux sorts packages by categories, which adds some helpful context and labels. What I like about Parrot is the ease of use and the privacy-focused approach (no telemetry, anon surf, proxy).