{"id":2215,"date":"2025-05-05T07:08:50","date_gmt":"2025-05-05T07:08:50","guid":{"rendered":"https:\/\/havari.me\/?p=2215"},"modified":"2025-05-05T07:18:03","modified_gmt":"2025-05-05T07:18:03","slug":"%d8%a7%d9%94%d9%81%d8%b6%d9%84-%d8%aa%d9%88%d8%b2%d9%8a%d8%b9%d8%a7%d8%aa-%d9%84%d9%8a%d9%86%d9%83%d8%b3-%d9%84%d9%84%d9%82%d8%b1%d8%b5%d9%86%d8%a9-%d9%88%d8%a7%d8%ae%d8%aa%d8%a8%d8%a7%d8%b1-%d8%a7","status":"publish","type":"post","link":"https:\/\/havari.me\/en\/linux\/%d8%a7%d9%94%d9%81%d8%b6%d9%84-%d8%aa%d9%88%d8%b2%d9%8a%d8%b9%d8%a7%d8%aa-%d9%84%d9%8a%d9%86%d9%83%d8%b3-%d9%84%d9%84%d9%82%d8%b1%d8%b5%d9%86%d8%a9-%d9%88%d8%a7%d8%ae%d8%aa%d8%a8%d8%a7%d8%b1-%d8%a7\/","title":{"rendered":"The best Linux distributions for hacking and penetration testing"},"content":{"rendered":"<div dir=\"rtl\">\n<style>\n\/* WordPress-style general styling *\/\nbody {\n    font-family: 'Noto Sans Arabic', sans-serif;\n    color: #333;\n    line-height: 1.8;\n    direction: rtl;\n}\n.wp-block-group {\n    margin-bottom: 2em;\n    padding: 0 1em;\n}\n.wp-block-group h3 {\n    color: #2c3e50;\n    font-size: 1.8em;\n    margin-bottom: 0.5em;\n    border-bottom: 2px solid #3498db;\n    padding-bottom: 0.2em;\n}\n.wp-block-group h4 {\n    color: #34495e;\n    font-size: 1.4em;\n    margin-bottom: 0.5em;\n}\n.wp-block-group p {\n    color: #555;\n    font-size: 1.1em;\n    margin-bottom: 1em;\n}\n.wp-block-group ul {\n    list-style-type: disc;\n    margin-right: 2em;\n    margin-bottom: 1em;\n}\n.wp-block-group ul li {\n    margin-bottom: 0.5em;\n    color: #555;\n}\n.wp-block-group strong {\n    color: #2c3e50;\n}<\/p>\n<p>\/* Code block styling with syntax highlighting *\/\n.wp-block-code {\n    background: #1e1e1e;\n    color: #d4d4d4;\n    padding: 16px;\n    border-radius: 8px;\n    font-family: 'Consolas', 'Monaco', monospace;\n    font-size: 14px;\n    overflow-x: auto;\n    margin: 1em 0;\n    border: 1px solid #3c3c3c;\n}\n.wp-block-code code {\n    display: block;\n}\n.wp-block-code.ini .key { color: #9cdcfe; } \/* e.g., INI keys *\/\n.wp-block-code.ini .value { color: #b5cea8; } \/* e.g., INI values *\/\n.wp-block-code.ini .section { color: #ce9178; } \/* e.g., INI section headers *\/<\/p>\n<p>\/* Responsive design *\/\n@media (max-width: 768px) {\n    .wp-block-group h3 {\n        font-size: 1.5em;\n    }\n    .wp-block-group h4 {\n        font-size: 1.2em;\n    }\n    .wp-block-group p {\n        font-size: 1em;\n    }\n}\n<\/style>\n<h1><\/h1>\n<p>Discover the best Linux distributions that can help you learn hacking and penetration testing.<\/p>\n<hr \/>\n<h2>1. Kali Linux<\/h2>\n<p><strong>Summary:<\/strong><br \/>\nKali Linux is the most popular Linux distribution for ethical hacking and penetration testing, developed by Offensive Security.<\/p>\n<ul>\n<li><strong>Basis:<\/strong> Debian<\/li>\n<li><strong>Features:<\/strong>\n<ul>\n<li>Wide range of penetration testing tools<\/li>\n<li>A periodic release form to keep tools up to date<\/li>\n<li>Support for various devices and device platforms<\/li>\n<li>Comprehensive documentation and an active community<\/li>\n<\/ul>\n<\/li>\n<li><strong>Use:<\/strong> They can be easily installed in VirtualBox within Windows to practice hacking right away.<\/li>\n<li><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/itsfoss.com\/content\/images\/2023\/04\/Kali_Linux_2023.1.jpg?ssl=1\" alt=\"img\" \/><\/li>\n<\/ul>\n<hr \/>\n<h2>2. BackBox<\/h2>\n<p><strong>Summary:<\/strong><br \/>\nBackBox is an Ubuntu-based distribution designed for penetration testing and security assessment.<\/p>\n<ul>\n<li><strong>Features:<\/strong>\n<ul>\n<li>A dedicated software repository containing the latest stable versions of analysis toolkits and ethical hacking tools<\/li>\n<li>Moderate design with XFCE desktop environment<\/li>\n<li>Fast, efficient and customizable experience<\/li>\n<li>Supportive community<\/li>\n<li><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/itsfoss.com\/content\/images\/2023\/04\/Backbox.png?ssl=1\" alt=\"img\" \/><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<hr \/>\n<h2>3. ParrotOS<\/h2>\n<p><strong>Summary:<\/strong><br \/>\nParrotOS is a powerful penetration testing alternative developed by Frozenbox Network.<\/p>\n<ul>\n<li><strong>Basis:<\/strong> Debian<\/li>\n<li><strong>Features:<\/strong>\n<ul>\n<li>Cloud-friendly environment with anonymous online experience and encrypted system<\/li>\n<li>MATE desktop environment<\/li>\n<li>Available in Security, Home, and Architecture editions<\/li>\n<li>Variants for VirtualBox, VMware and others\n<p><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/itsfoss.com\/content\/images\/2023\/04\/ParrotOS.png?ssl=1\" alt=\"img\" \/><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<hr \/>\n<h2>4. BlackArch<\/h2>\n<p><strong>Summary:<\/strong><br \/>\nBlackArch is a penetration testing and security research distribution built on Arch Linux.<\/p>\n<ul>\n<li><strong>Features:<\/strong>\n<ul>\n<li>A warehouse with thousands of tools organized into various collections<\/li>\n<li>Specialized offering for penetration testing<\/li>\n<li>Can be set up on top of existing Arch Linux installations\n<p><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/itsfoss.com\/content\/images\/2023\/04\/BlackArch.png?ssl=1\" alt=\"img\" \/><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<hr \/>\n<h2>5. Samurai Web Testing Framework<\/h2>\n<p><strong>Summary:<\/strong><br \/>\nSamurai Web Testing Framework is dedicated to web penetration testing and is supported by VirtualBox and VMware.<\/p>\n<ul>\n<li><strong>Basis:<\/strong> Ubuntu<\/li>\n<li><strong>Features:<\/strong>\n<ul>\n<li>The best open source tools for testing and attacking websites<\/li>\n<li>A pre-configured wiki for storing penetration testing information\n<p><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/itsfoss.com\/content\/images\/2023\/04\/Samurai.png?ssl=1\" alt=\"img\" \/><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<hr \/>\n<h2>6. Pentoo Linux<\/h2>\n<p><strong>Summary:<\/strong><br \/>\nPentoo Linux is a Gentoo-based distribution, focused on security and penetration testing.<\/p>\n<ul>\n<li><strong>Features:<\/strong>\n<ul>\n<li>LiveCD with continuity support (i.e. any changes made in the live environment will be available on the next boot if you use a USB stick)<\/li>\n<li>Custom tools and kernel features<\/li>\n<li>XFCE desktop environment<\/li>\n<li>Available as an add-on for existing Gentoo users\n<p><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/itsfoss.com\/content\/images\/2023\/04\/pentoo.png?ssl=1\" alt=\"img\" \/><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<hr \/>\n<h2>7. CAINE<\/h2>\n<p><strong>Summary:<\/strong><br \/>\nCAINE is a distribution designed for digital forensics.<\/p>\n<ul>\n<li><strong>Features:<\/strong>\n<ul>\n<li>Wide range of tools to analyze and diagnose systems<\/li>\n<li>Fully focused on digital forensics\n<p><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/itsfoss.com\/content\/images\/2023\/04\/Caine.png?ssl=1\" alt=\"img\" \/><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<hr \/>\n<h2>8. Network Security Toolkit<\/h2>\n<p><strong>Summary:<\/strong><br \/>\nNetwork Security Toolkit is a living operating system built on Fedora that provides a variety of open source network security tools.<\/p>\n<ul>\n<li><strong>Features:<\/strong>\n<ul>\n<li>Advanced web interface for system\/network management and monitoring<\/li>\n<li>Supports professionals and network administrators\n<p><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/itsfoss.com\/content\/images\/2023\/04\/NST.png?ssl=1\" alt=\"img\" \/><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<hr \/>\n<h2>9. Fedora Security Spin<\/h2>\n<p><strong>Summary:<\/strong><br \/>\nFedora Security Spin is designed for security review and testing, and can be used for educational purposes.<\/p>\n<ul>\n<li><strong>Features:<\/strong>\n<ul>\n<li>Supports students and teachers as they practice or learn security methods: Information security, web application security, forensic analysis, and more\n<p><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/itsfoss.com\/content\/images\/2023\/04\/Fedora-security.png?ssl=1\" alt=\"img\" \/><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<hr \/>\n<h2>10. ArchStrike<\/h2>\n<p><strong>Summary:<\/strong><br \/>\nArchStrike (formerly ArchAssault) is a project built on Arch Linux for penetration testing and professionals.<\/p>\n<ul>\n<li><strong>Features:<\/strong>\n<ul>\n<li>Includes thousands of tools and applications categorized into certified package sets<\/li>\n<li>Combines the best aspects of Arch Linux with additional tools for penetration testing and cybersecurity\n<p><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/itsfoss.com\/content\/images\/wordpress\/2016\/07\/ArchAssault.jpg?ssl=1\" alt=\"img\" \/><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<hr \/>\n<h2>Other distributions<\/h2>\n<p>Although the distributions mentioned above are highly suitable for hacking and penetration testing, there are newer options like Athena OS that can be reviewed.<\/p>\n<hr \/>\n<p><strong>Share your opinions:<\/strong><\/p>\n<p>Which Linux hacking distributions have you tried? Suggest any distributions we may have missed in the comments!\n<\/p><\/div>","protected":false},"excerpt":{"rendered":"<p>\u0627\u0643\u062a\u0634\u0641 \u0623\u0641\u0636\u0644 \u062a\u0648\u0632\u064a\u0639\u0627\u062a \u0644\u064a\u0646\u0643\u0633 \u0627\u0644\u062a\u064a \u064a\u0645\u0643\u0646 \u0623\u0646 \u062a\u0633\u0627\u0639\u062f\u0643 \u0641\u064a \u062a\u0639\u0644\u0645 \u0627\u0644\u0642\u0631\u0635\u0646\u0629 \u0648\u0627\u062e\u062a\u0628\u0627\u0631 \u0627\u0644\u0627\u062e\u062a\u0631\u0627\u0642. 1. Kali Linux (\u0643\u0627\u0644\u064a \u0644\u064a\u0646\u0643\u0633) \u0645\u0644\u062e\u0635: Kali Linux (\u0643\u0627\u0644\u064a \u0644\u064a\u0646\u0643\u0633) \u0647\u064a \u0623\u0634\u0647\u0631 \u062a\u0648\u0632\u064a\u0639\u0629 \u0644\u064a\u0646\u0643\u0633 \u0644\u0644\u0642\u0631\u0635\u0646\u0629 \u0627\u0644\u0623\u062e\u0644\u0627\u0642\u064a\u0629 \u0648\u0627\u062e\u062a\u0628\u0627\u0631 \u0627\u0644\u0627\u062e\u062a\u0631\u0627\u0642\u060c \u0648\u0642\u062f \u0637\u0648\u0631\u062a\u0647\u0627 \u0634\u0631\u0643\u0629 Offensive Security. \u0627\u0644\u0623\u0633\u0627\u0633: \u062f\u0628\u064a\u0627\u0646 \u0627\u0644\u0645\u064a\u0632\u0627\u062a: \u0645\u062c\u0645\u0648\u0639\u0629 \u0643\u0628\u064a\u0631\u0629 \u0645\u0646 \u0623\u062f\u0648\u0627\u062a \u0627\u062e\u062a\u0628\u0627\u0631 \u0627\u0644\u0627\u062e\u062a\u0631\u0627\u0642 \u0646\u0645\u0648\u0630\u062c \u0625\u0635\u062f\u0627\u0631 \u062f\u0648\u0631\u064a \u0644\u062a\u062d\u062f\u064a\u062b \u0627\u0644\u0623\u062f\u0648\u0627\u062a \u0628\u0627\u0633\u062a\u0645\u0631\u0627\u0631 \u062f\u0639\u0645 \u0644\u0645\u062e\u062a\u0644\u0641 \u0627\u0644\u0623\u062c\u0647\u0632\u0629 \u0648\u0645\u0646\u0635\u0627\u062a [&hellip;]<\/p>","protected":false},"author":1,"featured_media":2220,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"jetpack_post_was_ever_published":false,"footnotes":""},"categories":[35,38],"tags":[6,63,64],"class_list":["post-2215","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-linux","category-security","tag-linux","tag-security","tag-64"],"acf":[],"aioseo_notices":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/havari.me\/wp-content\/uploads\/2025\/05\/unnamed-file.png?fit=2048%2C1024&ssl=1","_links":{"self":[{"href":"https:\/\/havari.me\/en\/wp-json\/wp\/v2\/posts\/2215","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/havari.me\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/havari.me\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/havari.me\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/havari.me\/en\/wp-json\/wp\/v2\/comments?post=2215"}],"version-history":[{"count":5,"href":"https:\/\/havari.me\/en\/wp-json\/wp\/v2\/posts\/2215\/revisions"}],"predecessor-version":[{"id":2221,"href":"https:\/\/havari.me\/en\/wp-json\/wp\/v2\/posts\/2215\/revisions\/2221"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/havari.me\/en\/wp-json\/wp\/v2\/media\/2220"}],"wp:attachment":[{"href":"https:\/\/havari.me\/en\/wp-json\/wp\/v2\/media?parent=2215"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/havari.me\/en\/wp-json\/wp\/v2\/categories?post=2215"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/havari.me\/en\/wp-json\/wp\/v2\/tags?post=2215"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}