Summary

In this chapter, we learned that Kali Linux in a virtual environment can be effectively used to perform vulnerability assessment and penetration tests. We also went through some absolute basics about Kali Linux and configure its environment.