
You can find many of them on Github, other websites or with a good Google search. There are several more tools and resources out there that can be useful on your journey. However, these tools barely scratch the surface of what you can install and use in the wild. We have now installed some tools for our Kali Linux machine. What we just did was clone the file, but we created a folder named “seclists” in the wordlists folder Type “sudo git clone /usr/share/wordlists/seclists”.

Open a new command terminal or type “clear” in your existing terminal to clear the screen. However, this time we are going to direct where we want the file to download which will be the wordlist folder. We are going to download this wordlist the same way we downloaded the Discover script using the git clone command. One of the more popular wordlists is Daniel Miessler’s SecLists. Kali Linux does come with some wordlists already installed, but there are several more you can find over the internet. However, these skills and tools will never be successful without the proper lists to assist in the process. Cracking passwords and performing fuzzing techniques are very crucial skills to know in penetration testing. The next tool we are going to install isn’t necessarily a tool, it is more of a resource.

However, there are some really good tools that are do not come installed in the image. Kali Linux contains several penetration testing tools installed by default as well as some that are pre-installed. We are going to go over how to install some tools on Kali Linux. But before we do that, there is one more thing we should go over before we get started.

We are almost ready to start firing off scans, popping some shells and cracking some passwords.

So far, we have downloaded, and installed our Kali Linux virtual machine and we have installed updates and taken some measures to secure our Kali image.
