Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. It is maintained and funded by Offensive Security Ltd. pre-installed with over 300 penetration-testing programs, including Armitage (a graphical cyber attack management tool), nmap (a port scanner), Wireshark (a packet analyzer), John the Ripper (a password cracker), Aircrack-ng (a software suite for penetration-testing wireless LANs), Burp suite and OWASP ZAP (both web application security scanners). Kali Linux can be installed on the hard drive or it can be booted from a live CD or live USB, or within a virtual machine. It is a supported platform of the Metasploit Project’s Metasploit Framework, a tool for developing and executing security exploits.
1.) Download ISO.
Before you get started you should make sure that your machine meets the minimum requirements, and what architecture type, bit or 64-bit. you can find more information on the Kali Linux Information page that contains more information and links for downloading the ISO files needed to create the install media.
2.) Create Installation Media.
Depending on the age of your machine you may have a few different options as to how you create the installation media, most commonly you can burn the ISO to a DVD with your favorite disk burning software, also you may wish to create a bootable USB drive.
3.) Boot To Installation Media.
Insert the installation media into your machine and power it on, you may be required to modify your systems BIOS/CMOS so your machine will boot to the proper device.